Introduction to Cryptography - Old Questions

6.     a) How hash function differ from MAC? Discuss how data integrity can be achieved from either of them.                                                                                                                    (5)

5 marks | Asked in 2070