1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
4 years ago
13

HMAC can be used to simultaneously verify both data integrity and authenticity of the message: i. Briefly explain how data integ

rity is verified ii. Briefly explain what value is used to verify authenticity of the message
Computers and Technology
1 answer:
Shkiper50 [21]4 years ago
3 0

Answer:

HMAC is a Hash Function which uses both the message and the secret key as the input.The key which is there is split into two parts mainly the inner key and the outer key the inner key is used along with the message to compute the internal hash value,after computing internal hash value it is again used along with the external key to compute the final hash value.

1)Since the message is hashed any change in the message causes a change in the hash value thus the data integrity is verified.

2)Authenticity of the message is ensured as the secret key is used to find out the hash value along with the message and thus at the receiving side the hash is recomputed and if it does not match then the authenticity of the message is lost basically the secret key is used to verify the authenticity.

You might be interested in
A spreadsheet is an example of a(n):
zhenek [66]

Answer:

general-purpose application

Explanation:

General purpose application

1. These are software applications which can be used for multiple purposes.

2. These applications perform various tasks as per the need of the user. These tasks can vary in complexity and may or may not be related to each other.

3. These applications are useful for almost all categories of users.

Example include spreadsheets which is a primary application for accounting purpose. It can also be used for to store numerical data or other data in an organized format.

Another use of spreadsheets is visible in data analysis. Graphs and charts can be created based on the given numerical data stored in the spreadsheet. This helps in business growth.

Microsoft Excel and Apple Numbers are spreadsheet applications.

Another example is a word application that can be used to prepare document, reports, and flyers also. Microsoft word is a word processor.

Specialized program

1. These are software applications which can be used for special purpose only.

2. These applications can perform only the task for which it is created.

Examples include windows media player. This application can only run media (audio or video) programs.

System application

1. These include operating system and utility applications.

2. The operating system acts as an interface between the user and the hardware resources of the computer.

For example, Windows is an operating system. It is available in various versions.

3. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

Anti-virus is an example of utility applications. It protects the computer resources from virus.

Utility applications

4. The computer system and its resources, both software and hardware, are maintained and optimized using utility applications.

5. These applications are mandatory to smooth functioning of a computer.

For example, disk driver, file manager and back up applications help in managing disks and aid in taking back ups and file management is done by file manager

8 0
3 years ago
Mary wants to send a message to Sam in such a way that only Sam can read it. Which key should be used to encrypt the message
barxatty [35]
Sam’s Public Key. Hope it helps)
6 0
3 years ago
You can put a small level on your camera to help keep the horizons straight? TRUE OR FALSE
anastassius [24]
The answer is true and i believe it is best to put it at the 4 intersecting points<span />
5 0
3 years ago
Read 2 more answers
The internet has provided great opportunities for fundraising. true/false
alekssr [168]
True, sites such as kickstarter and just giving are fantastic examples of such.
8 0
3 years ago
System analysis and design
Oksana_A [137]

Answer:

teachers go hard on you dont they

Explanation:

5 0
4 years ago
Other questions:
  • Which of these is an on-site metric for social media marketing?
    13·1 answer
  • Let's assume that the smallest possible message is 64 bytes (including the 33-byte overhead). if we use 100base-t, how long (in
    10·1 answer
  • When does kernel panic occur?
    14·1 answer
  • In fixed-width files, each record is on a separate line and the fields are separated by a special character.
    7·1 answer
  • Which tag provides information about a web site?
    12·1 answer
  • What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi?
    9·1 answer
  • GAMER OYUNCU KOLTUĞU % YERLİ
    6·1 answer
  • Write a qbasic program to display integer numbers 1 to 100 using the for next loop<br>​
    9·1 answer
  • What’s ur guys rank of all 3D Mario games (all of these are great games btw)? These are my opinions I’d rly enjoy hearing yours.
    8·1 answer
  • of the choices listed, which is the correct protocol to access a remote computer and execute commands?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!