Recommend which hash function the company should use


Discussion: "Hash Functions and Message Authentication"

Answer the following question

• Stallings states, "...perhaps the most versatile cryptographic algorithm is the cryptographic hash function." State your opinion as to whether or not you agree or disagree with him. Provide a rationale for your response. Use internet references published within the past year.

• Imagine that the Chief Technology Officer (CTO) of your organization has to decide whether to use message authentication code (MAC) or key (cryptographic) hash function and has asked you for your opinion. Recommend which hash function the company should use and provide a rationale for your response. Use Internet references published within the past year.

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Recommend which hash function the company should use
Reference No:- TGS02071784

Now Priced at $25 (50% Discount)

Recommended (92%)

Rated (4.4/5)