A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic hash value c*n be mitigated by:
A message is being sent with a hash. The risk of an attacker changing the message and generating an authentic hash value c*n be mitigated by:A . generating hash output that is the same size as the original message,B . requiring the recipient to use a different hash algorithm,C ....