Question: Information Security Question This question is about non-repudiation. Assume none of the keys are compromised. a. What is non-repudiation? b. Can MAC (message authentication code)
Information Security Question
This question is about non-repudiation. Assume none of the keys are compromised.
a. What is non-repudiation?
b. Can MAC (message authentication code) provide non-repudiation? Why or why not?
c. Can a digital signature that uses public key crypto provide non-repudiation? Why or why not?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
