Option B is correct. The SK and the requested content should be encrypted using a secure algorithm like IAC, and a signature should be generated to ensure the integrity of the data.
Option A is incorrect. The MD5 algorithm is not recommended for cryptographic applications due to security vulnerabilities. A more secure hashing algorithm like SHA-256 should be used instead.
Dick
27 days agoLaura
2 days agoJustine
3 days agoLatonia
8 days agoMicah
12 days agoDorothy
28 days agoJudy
29 days agoMargery
29 days agoAzzie
1 months ago