Which figure implements confidentiality and authentication?
I had been asked this question during an online interview.
The above asked question is from Message Authentication Codes (MACs) topic in section Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security