1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
7

As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in

clude information previously shared / agreed upon by the sender and receiver.)
Computers and Technology
1 answer:
Nataliya [291]3 years ago
6 0

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
You might be interested in
Assume the number variable contains the number 1000.
Inga [223]

Answer:

Explanation:

We could get the four options for this particular example, but we must know what happens with the variable number the value 1000.

In this case, we are going to assume four scenarios:

1) n = n - n this is equal to 0

2) n = (n - n) + n = 1000

3) n = n * 2 = 2000

4) n = n * 3 = 3000

These are simple examples, we could get these options in different ways.

5 0
3 years ago
How to turn robot voice like real human voice.
Step2247 [10]
Go in front of the mirror and act like robot and talk ,there you have a robot voice like real human voice
7 0
3 years ago
9.17 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is
AlexFokin [52]

Answer:

Hence the code is given as follows,

import java.util.Scanner;

public class LabProgram {

   public static String createAcronym(String userPhrase){

       String result = "";

       String splits[] = userPhrase.split(" ");

       for(int i = 0;i<splits.length;i++){

           if(splits[i].charAt(0)>='A' && splits[i].charAt(0)<='Z')

               result += splits[i].charAt(0);

       }

       return result;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       String s = scan.nextLine();

       System.out.println(createAcronym(s));

   }

}

6 0
3 years ago
Hexadecimal (19BACDFE)H into Octal. Please write step by step.
lubasha [3.4K]
The H idk, but till E is i think 3156546776
4 0
4 years ago
ساعدوني على الإجابة على هذه الأسئلة
aleksandr82 [10.1K]

Answer:

Can you Translate for Russian or Eanglish

Explanation:

7 0
3 years ago
Other questions:
  • .What is a wildcard character? How would you use it to find a record?
    15·1 answer
  • Which of the following sentences is written in the active voice
    12·2 answers
  • Which generation is called the new silent generation?
    6·1 answer
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    8·2 answers
  • Match the terms with their definitions.
    5·2 answers
  • ​the complete definition of a database, including descriptions of all fields, tables, and relationships, is called a _____.
    7·1 answer
  • According to a case study in one of our weekly chapter reading, nearly..................... percent of all employees send work e
    11·2 answers
  • _______ is the use of software to assist in the creation, analysis, and modification of the design of a component or product.
    9·1 answer
  • Consider that a man is watching a picture of a Black Horse. He receives an external stimulus from input channel. Man gains some
    14·1 answer
  • what are some examples of security goals that you may have for an organization? check all that apply.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!