1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
7

As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in

clude information previously shared / agreed upon by the sender and receiver.)
Computers and Technology
1 answer:
Nataliya [291]3 years ago
6 0

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
You might be interested in
What is the difference between (IF instructions &amp; WHILE instructions )<br> 0<br> 를 들<br> T<br> !
lara31 [8.8K]

Answer:

While statements determine whether a statement is true or false. If what’s stated is true, then the program runs the statement and returns to the first step. If what’s stated is false, the program exits the while and goes to the next statement. An added step to while statements is turning them into continuous loops. If you don’t change the value so that the condition is never false, the while statement becomes an infinite loop.

If statements are the simplest form of conditional statements, statements that allow us to check conditions and change behavior/output accordingly. The part of the statement following the if is called the condition. If the condition is true, the instruction in the statement runs. If the condition is not true, it does not. The if statements are also compound statements. They have a header (if x) followed by an indented statement (an instruction to be followed is x is true). There is no limit to the number of these indented statements, but there must be at least one.

7 0
3 years ago
Information distribution includes all of the following EXCEPT:Group of answer choices
Svet_ta [14]

Answer:

e.All of these are examples of information distribution

Explanation:

Information distribution can be carried out using the following means:

a. Face-To-Face Meetings

b.Telephone, e-mail, and other wireless devices

c.Web-based technologies  such as video conferencing, IP Call etc.

All of these mechanisms enabled the information disseminator to communicate the information to the recipient(s).

So option (e) is the correct choice.

5 0
4 years ago
Which branch of study can help Jessica study the concept of light
Fiesta28 [93]

Answer:

Physics, Quantum Mechanics

Explanation:

Light is a stream of photons with no weight. If you want to dig deeper in this mysterious phenomena, you should study physics and quantum mechanics. Physics takes up things like the theory of relativity, which can be useful in studying spacetime and how light travels through it, and quantum mechanics, being the study of matter in an atomic level, should help you get an understanding on how photons of light travel and why they behave so strangely.

4 0
3 years ago
I will give the brainly or whatever its called
igomit [66]

Answer:

Just answer everyones questions and youll be at the right rank in no time

Explanation:

5 0
3 years ago
Read 2 more answers
A user calls your help desk to report that the files on her USB stick do not have any permissions associated with them and there
Delicious77 [7]
It is (D) because FAT 32 is the most secure option that is why it is most popular
7 0
3 years ago
Read 2 more answers
Other questions:
  • Although the American National Standards Institute publishes the specifications for a standard SQL language, each DBMS vendor ha
    7·1 answer
  • I NEED SOME MAJOR HELP W/ THIS!!! PLSSS. WHOEVER HELPS GETS 80 POINTS!!! I NEED IT DONE SOON! TYY &lt;3;)
    13·1 answer
  • Write a Java program to accept an item's name and price from the user and output them to the console
    5·1 answer
  • What is the output of the following program segment? int main() { int num = 5; cout &lt;&lt; num &lt;&lt;" "; change(num); cout
    8·1 answer
  • In this lab, you will use all of the graphics commands you have learned to create an animated scene. Your program should have a
    10·1 answer
  • 1. Define Validation Rule
    14·1 answer
  • Why do we use antivirus program?<br><br>please tell fast​
    12·1 answer
  • Question 1 (1 point)
    5·2 answers
  • Before radio, many minority musicians were severely limited by the prejudice of the era. true o rfalse
    12·2 answers
  • write ms-dos command to list all the files and folders of EIGHT sub directory of C: drive in ascending order according to file n
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!