To confirm integrity for a hashed message, the receiver should use:
- the same hashing algorithm as the sender's to create a binary image of the file.
- a different hashing algorithm from the sender's to create a numerical representation of the file.
- a different hashing algorithm from the sender's to create a binary image of the file.
- the same hashing algorithm as the sender's to create a numerical representation of the file.
Reveal Solution Next Question