1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
2 years ago
6

Why is the middle portion of 3des a decryption rather than an encryption?

Computers and Technology
1 answer:
Rainbow [258]2 years ago
6 0

Answer:

There is no cryptographic significance to the use of decryption for the second stage. Its only advantage is that it allows users of 3DES to decrypt data encrypted by users of the older single DES by repeating the key.

You might be interested in
What enables a website to recognize a computer as a return visitor (as opposed to a first-time visitor)?
Paha777 [63]

Answer:

Cokies

Explanation:

Cokies are files that saves on a website server that enables the website to recognize a computer when it visit the website. So for the first time a computer visit a website, the website brings a little pop up that ask the user to accept Cokies and if the user accepts, the website will be able to recognize the computer when next it visit.

5 0
3 years ago
The top-down approach is an appropriate strategy for most
puteri [66]

Answer:

true

Explanation:

The Top-down approach is an approach to a problem that focuses on the big picture first before moving down into the specifics of the topic/problem. Therefore based on the information provided within the question it can be said that the statement being made is completely true. Since the interviewer using this approach starts with a broad topic and later goes into the details, it does allow them to be accustomed to the topic first.

8 0
3 years ago
A. What is MS-Word ? Write its uses.
solmaris [256]

Answer:

MS word is Microsoft word and you can use MS Word in daily life and business to create professional-looking documents such as resume, letters, applications, forms, brochures, templates, business cards, calendars, reports, eBooks, and newsletters in speed with high quality.

Explanation:

6 0
3 years ago
Read 2 more answers
Which of the following best explains the concept of a prototype
gladu [14]
A prototype<span> is an early sample, model, or release of a product built to test a </span>concept<span> or process or to act as a thing to be replicated or learned from. It is a term used in a variety of contexts, including semantics, design, electronics, and software programming.</span>
3 0
3 years ago
What class of attacks use innovative attack tools and once a system is infected it silently extracts data over an extended perio
KatRina [158]

Answer:

Advanced persistent threat.

Explanation:

Advanced persistent threat is a threat actor implemented by either a government supported or private group to intrude a network or system and stays undetected, collecting information over a period of time.

It is used by cyber terrorist group to facilitate massive attacks based on the information retrieved. National or government group use the concept to promote national security.

7 0
3 years ago
Other questions:
  • 2. Identify the diagram and define it.<br>13. What are pollen grains ?<br>4. What is an embryo?​
    12·1 answer
  • Which option nukes your systemâall apps, programs, user files, user settingsâand presents a fresh installation of Windows?
    13·1 answer
  • What is the term for a Web site that allows users to access and interact with software from any Internet-connected computer or d
    11·1 answer
  • In a Java Script language. create a two-dimension array consisting of numbers representing costs. After creating the array, prin
    11·1 answer
  • By
    7·1 answer
  • Menus are attached to the windows by calling
    15·1 answer
  • CALLING ALL DEKUS UWU
    15·2 answers
  • I just wanna know how many times a day y'all hit the tutor button at the bottom
    10·2 answers
  • 3. Which part of the computer is used<br> for typing?<br> a. Mouse<br> b. Keyboard
    7·2 answers
  • Suppose that you have declared a numeric array named numbers, and two of its elements are numbers[1] and numbers[4]. You know th
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!