Which two steps does a receiver perform to validate a message using HMAC? ()
- A decrypts the received MAC using a secret key
- B compares the computed MAC vs. the MAC received
- C authenticate the receivedmessage using the sender’s public key
- D look up the sender’s public key
- E extracts the MAC from the receivedmessage thenencrypts the received message with a secret keyto producethe MAC
- F Computes the MAC using the receivedmessage and a secret key as inputs to the hash functio