问题:
A . decrypts the received MAC using a secret key
B . compares the computed MAC vs. the MAC received
C . authenticate the receivedmessage using the sender’s public key
D . look up the sender’s public key
E . extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MAC
F . Computes the MAC using the receivedmessage and a secret key as inputs to the hash functio
● 参考解析
本题暂无解析
相关内容
相关标签