Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation?
(Choose two.)
A. Block cipher
B. Hashing
C. Private key
D. Perfect forward secrecy
E. Salting
F. Symmetric keys
Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation?
(Choose two.)
A. Block cipher
B. Hashing
C. Private key
D. Perfect forward secrecy
E. Salting
F. Symmetric keys