A security practitioner needs to ensure the integrity of a software patch before it is distributed to users. The goal is to provide a way for users to verify that the patch has not been altered in transit. Which cryptographic process is MOST suitable for this purpose?
-
A
Symmetric encryption
-
B
Hashing
-
C
Steganography
-
D
Asymmetric encryption