1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
3 years ago
9

What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?

Can you have integrity without confidentiality? Justify your answer.
Computers and Technology
1 answer:
Artist 52 [7]3 years ago
3 0

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

You might be interested in
____ refers to the ability of one computing device (a desktop computer, portable computer, or smartphone, for example) on a netw
SCORPION-xisa [38]
<span>Presence technology is the answer</span>
8 0
3 years ago
The VP of sales at universal containers requested that "Verbal Agreement" be added as a new opportunity stage. The Administrator
Ahat [919]

Answer:

D. Add the new value to the appropriate sales process.

Explanation:

7 0
4 years ago
What does the ip address dhcp command allow you to do?
slega [8]
The above command allows any interface to learn its IP address dynamically by using the DHCP protocol. It is best suited for Ethernet interfaces that dynamically connect to an ISP.
It also in the majority of cases configures the switch to acquire an IP from a DHCP server. Once one inputs this command, it contains a discover message that includes the MAC address of the ethernet interface and the default hostname of the router.
8 0
3 years ago
Base conversion. Perform the following conversion (you must have to show the steps to get any credit.
Firdavs [7]

Base to be converted to was not included but we would assume conversion to base 10(decimal)

Answer and Explanation:

The 3DF in base 16 is a hex number so we need to convert to its equivalent binary/base 2 form:

We therefore each digit of given hex number 3DF in base 16 to equivalent binary, 4 digits each.

3 = 0011

D = 1101

F = 1111

We then arrange the binary numbers in order

3DF base 16 = 1111011111 in base 2

We then convert to base 10 =

= 1x2^9+1x2^8+1x2^7+1x2^6+0x2^5+1x2^4+1x2^3+1x2^2+1×2^1+1×2^0

= 991 in base 10

3 0
3 years ago
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understandi
Murrr4er [49]
Yes you can but it helps to understand the technical details so if there is ever an issue you could identify and fix said issue easier.
8 0
3 years ago
Other questions:
  • A) What is the maximum value that can be represented as an unsigned n-bit binary integer?
    13·1 answer
  • Of which of the following devices are point, drag, and click actions?
    15·1 answer
  • How can you specify a page has the highest priority?
    7·1 answer
  • What property of semi-metals is useful in the computer industry?
    7·1 answer
  • For each of the following cases, select the type of NoSQL DBMS that would fit best the needs of the situation. a. The database h
    10·1 answer
  • The calculation of GDP is the sum of: Consumption, Investment, Government Spending, and Net Exports. What is the simple formula
    7·1 answer
  • Explain the three schemes via which the binding of instructions and data to memory addresses can be done. In each scheme, how th
    13·1 answer
  • Naynar kis dhrm se sambandhit hai​
    15·2 answers
  • The __________ tool is present under the Windows Administrative Tools folder of the Start menu. Your answer​
    13·1 answer
  • Do software engineers save millions of dollars in usa
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!