1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rzqust [24]
3 years ago
7

As described in class, what does the sender send to the receiver when using hashing for integrity and authentication? (Do not in

clude information previously shared / agreed upon by the sender and receiver.)
Computers and Technology
1 answer:
Nataliya [291]3 years ago
6 0

Answer:

The answer is "secret key k".

Explanation:

When the sender sends the message, he/she may combine, it with the hidden key, and determines the hashing, when transmitting the information the digest is being sent, and also the message is transmitted through the connection.

when the receiver receives the message, still having the very same secret key, adding the Hidden Key then recalculating the hashing again. In this, two factors if another subsequent digest matches something, this message is sent.  

  • During transit, the message was certainly not changed.
  • Anybody with the private key – preferably even a preferred sender sent out this letter.
You might be interested in
If you said the bottom margin, you are talking about what?
user100 [1]
The space between the words and the edge of the paper
3 0
3 years ago
Read 2 more answers
Who invented the first antivirus software and when was it written?
Bad White [126]

Answer:

The answer to this question can be given as:

The first antivirus was written in 1987 by the German security expert Bernd and the name of the antivirus is Vienna Virus.  

Explanation:  

Antivirus: It is a software or anti-malware software that is used for providing security. It is a tool that runs on various digital devices and searches for files that should not be on your computer. If the file is found then It defends the computer from incoming threats and seeks-out, stops and alerts of viable threats from the system so the computer works properly. So, the first antivirus was developed in 1987 by German security expert Bernd.

7 0
3 years ago
A reputable, world-renowned auction house uses blockchain to verify the authenticity of paintings prior to placing them up for s
REY [17]

Answer:

The ledgers are secure, shared, and incorruptible is the correct answer.

6 0
3 years ago
Every application program has a _______________ segment
Natali5045456 [20]
"Main" goes in the blank. For example in C++ all of your code goes in the main function.
4 0
3 years ago
When advertising on search engines, if you bid the same as your competitor, having a higher quality score will mean you appear w
Ksju [112]
Higher than your competitors
7 0
2 years ago
Other questions:
  • (011001111)2=(?)10 can anyone solve this urgent <br><br> Hurry
    11·2 answers
  • what properties are associated with all Microsoft Office files and include author, title, and subject
    5·1 answer
  • What aspect of the internet makes it fault-tolerant?
    6·1 answer
  • How can i become an expert in computer and technology?
    15·2 answers
  • ____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it ove
    15·1 answer
  • Which of the following is used to describe an authentication scenario in which a user logs in using a PIN and a security token
    7·2 answers
  • <br> Help me please I need the correct answe
    10·1 answer
  • Who ever can get me the lyrics to raining tacos will get 46 points + the crown! i want the song!
    10·2 answers
  • 1
    13·1 answer
  • You are the administrator for the ABC Company. You are looking to install Windows Server 2016, and you need to decide which vers
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!