SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start


From course:

IT-Sicherheit

» Start this Course
(Practice similar questions for free)
Question:

MAC - Verwendung

Author: Leonard Fourier



Answer:

- Ziel: Authentischer und vertraulicher Kanal - Typen > Encrypt-then-MAC > MAC-then-Encrypt > Encrypt and MAC


0 / 5  (0 ratings)

1 answer(s) in total