Bob is worried that the program someone gave him at DEFCON h
Bob is worried that the program someone gave him at DEFCON has been altered from the original. Which of the following is a valid technique that Bob can use to verify its authenticity?
A. Run AES against the program.
B. Compare the size and date with the version found on the developer’s website.
C. Run an MD5sum and check against MD5sum from developer sites.
D. Calculate a digital signature.
Solution
Answer :
Option C is correct.
----------------------------------------------------------------------------------------------------------------------------------------------
Explanation:
Run an MD5sum would be the finest way for Bob to confirm the program.
MD5sum is a hashing algorithm.
