Introduction to Cryptography - Old Questions
6. a) How hash function differ from MAC? Discuss how data integrity can be achieved from either of them. (5)
5 marks
|
Asked in 2070