Option B is correct. The SK and the requested content should be encrypted using a secure algorithm like IAC, and a signature should be generated to ensure the integrity of the data.
Option A is incorrect. The MD5 algorithm is not recommended for cryptographic applications due to security vulnerabilities. A more secure hashing algorithm like SHA-256 should be used instead.
Dick
17 days agoMicah
2 days agoDorothy
18 days agoJudy
19 days agoMargery
19 days agoAzzie
22 days ago