1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
d1i1m1o1n [39]
3 years ago
9

Encryption that uses 16-character keys is known as ____. strong 128-bit encryption strong 256-bit encryption military-strength 5

12-bit encryption military-strength 1,024-bit encryption
Computers and Technology
1 answer:
allsm [11]3 years ago
3 0

Answer: Strong 128-bit encryption.

Explanation: An individual character corresponds to 8 bits . So if there are 16 characters then,

16\times8=128 bits keys

This makes the 128 bit key encryption the strongest amongst all other options.It is strongest because it is almost impossible to decode the 128-character key  by any method e.g.-brute-force method.

Other options are incorrect because the characters given by the other bits are as follows:  {\frac{256}{8}=32 characters

                         {\frac{512}{8}=64 characters

                         {\frac{512}{8}=128 characters  

Thus, the strongest character key is of 128 bits. for cipher.

You might be interested in
Consider a bit stuffing framing method where the start of a frame is indicated by 6 consecutive ones, followed by 2 zeroes. What
Anastaziya [24]

Answer:

Explanation:

Bit stuffing Framing Method

In the given situation, the beginning casing is shown by 6 sequential ones followed by 2 zeroes.

The beginning casings are generally known as the flags.which are utilized for demonstrating the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the reciever.

Along these lines here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).

To enable us understand how this question plays out, let us understand the rule for Stuffing and De-stuffing .

The standard for stuffing is :

At whatever point there are 5 successive ones supplement one zero in the casing which is an information. The embedded zero piece is known as the stuffed bit.The principle reason behind stuffing somewhat after 5 back to back ones is to evade the distortion of information (data) as flag. If the reciever misconstrues the information as end banner then he would quit recieving the information where the entire information sent by the sender will be left and lost causing an error-prone information.

The rule for destuffing :

The standard/rule for destuffing is only inverse as stuffing. After recieving the bitstuffed information (data), at the reciever's end zero after each 5 continuous ones will be evacuated and the rest of the information will be considered as the genuine information.

In the given situation, the beginning casing is demonstrated by 6 back to back ones followed by 2 zeroes.

the beginning casings are normally known as the flags.which are utilized for showing the beginning and end of the edges. Essentially utilized for the synchronization between the sender and the receiver.

In this way here the beginning and end banners are 11111100(this is on the grounds that the end banner is same as the beginning banner).

  • data before bit stuffing is:  011111100011111101
  • the stream after stuffing would be: 011111<u>0</u>10001111<u>0</u>1101

where the bolded/underlined digits represents the stuffed bits

cheers i hope this helps

3 0
3 years ago
A Variable can only hold numbers<br><br> True<br><br> False
Effectus [21]

Answer:

true

Explanation:

tere are two types of variables and one can hold nos

5 0
3 years ago
Read 2 more answers
What is the 12-bit BCD binary code for 53810? (u8q12)?
liubo4ka [24]
This is weird. A BCD code allocates 4 bits (a nibble) for each digit. So a decimal number like 53810 has 5 digits, so would require 5*4 = 20 bits.

53810 = <span>0101 0011 1000 0001 0000

So, I don't see how you would fit that in 12 bits. What am I missing?</span>
3 0
3 years ago
The physical layer of the OSI model is not foundational to any of the other layers. True or False
galina1969 [7]

Answer:

False.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

The physical layer of the OSI model is the first layer of the OSI model and it is foundational to any of the other layers because it determines the means of transmitting (sending) raw bits from one network node to another and the electrical specification of network equipments.

5 0
3 years ago
True or false questions. If a statement is false, you must explain the reason why it is false: a). Suppose that TCP is being run
Dima020 [189]

Answer:

a. True

b. False

Explanation:

b. False

At the initial stage, the certificate needs to be encrypted not by the public key of certifier.com but by the by the private key of certifier.com.

After which, the certificate which contains lots information, (i.e there's more information in the certificate than just the public key to be certified). The certificate also the CA’s information, the certificate expiration date, etc.

Only this information’s digital fingerprint is encrypted by the certifier.com’s private key.

8 0
3 years ago
Read 2 more answers
Other questions:
  • Who can effectively use website authoring software?
    6·1 answer
  • Describe a scenario for which a find unmatched query could be used.
    12·1 answer
  • Which is the MOST efficient means of disentangling passengers from a wrecked​ vehicle? A. Remove the steering wheel and column.
    10·1 answer
  • Using for loop . Input an integer and identify whether it's EVEN OR ODD ( without using modulo operator )
    9·1 answer
  • Create a class called Hangman. In this class, Create the following private variables: char word[40], progress[40], int word_leng
    11·1 answer
  • When you move a paragraph in a document that includes text with a footnote, what happens to the footnote reference?
    14·1 answer
  • Add and multiply
    10·1 answer
  • I’ll mark brainliest if correct
    10·1 answer
  • 5.5 Learning Objective: To demonstrate that the student understands the definition of Big O. To demonstrate that the student und
    11·1 answer
  • CAN SOMEONE PLEASE HELP ME WRITE AN INTRODUCTION ??? COMMENT FOR TOPIC
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!