1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
6

You and your friend who lives far away want to fairly and randomly select which of the two of you will travel to the other’s hom

e for a visit. Your friend remembers having learned about using hashes as cryptographic commitments and proposes to use a coin toss to decide. He tells you to randomly choose ‘heads’ or ‘tails’ by throwing a coin, hash the result using sha256, and send him the hash. Once you have committed to the outcome, he’ll guess ‘heads’ or ‘tails’, you’ll reveal to him your choice and he can verify that the hash is correct. If his choice matches your coin toss, then your friend wins and you have to make the trip. What is the problem with this scheme, as described?
a.there’s no way to prove that your coin toss is random
b.there’s no way to prove that sha256 is collision resistant
c.your friend can hash all possible options and discover your secret
d.unless you sign the hash message your friend can’t be sure it was you who sent it
Computers and Technology
1 answer:
Phantasy [73]3 years ago
6 0

Answer:

c. your friend can hash all possible options and discover your secret.

Explanation:

SHA-256 is a set of hash functions that was designed by the NSA. SHA-2 is considered an upgrade on the set that was its predecessor, SHA-1. A hash is a mathematical function that condenses data in a process of one-way encryption. SHA-256 creates hash algoritms that are considered irreversible and unique. However, one of the properties of hashing algorithms is determinism, which means that any computer in the world would be able to compute a particular hash and get the same answer.

You might be interested in
The primary key is a field that uniquely and completely identifies a record.
Leokris [45]
True

----------------------------------
6 0
3 years ago
Read 2 more answers
Identify the following as True or False.
Leni [432]

Answer:

The answer to this question as follows:

1) False

2) False

3) True

Explanation:

The description of the above option as follows

  • In option 1, A single character variable must be contained in one quote mark, but it is based on the alphabet, which is a specific device, and the price of a continued character varies from one device to another, that's why it is false.
  • In option 2, This option is wrong because in assembly language the identifier value must not exceed the length than 247 characters.
  • In option 3, It is correct because in the variable declaration the first char should be a letter, _, @ or $letter. A total of 1-247 characters. The default case is insensitive.

5 0
3 years ago
A company needs to store its documents in one place, share news and information with all staff, and allow access for employees w
Alenkasestr [34]
C - An Intranet will give access to all employees within the company, whether they work from home or at the office.
4 0
3 years ago
Read 2 more answers
Which one cost more Broken bones or a Broken Computer? Explian ur answer
vladimir1956 [14]
Broken bones cost more, because hospital bills are a lot more than to get a computer fixed.
4 0
4 years ago
Read 2 more answers
Is the following a true statement in our world? Why or why not?
posledela

Answer:

The statement would be true

.

Explanation:

let,  L = is a NFL player

      M = teaches in CSU

      N = has tattoos

Given that:

nfl player who teaches in csu = L^ M                 (this is false every time)

Above statement is L ^ M -> N

this would be true because

false -> true                  (true

)

false -> false                  (true

)

Second  exp:

There are no players who teach in Csu therefore if we say they all have tattoos statement would be true.

4 0
3 years ago
Other questions:
  • How do media and networks interact
    11·1 answer
  • Why is it important to use proper line types
    13·1 answer
  • You would set a ___________ to prevent users from immediately changing their password several times in one day to return to the
    15·2 answers
  • What symbol following a menu command lets you know that a dialog box will be displayed? an arrow a check mark an ellipse a radio
    5·2 answers
  • Web pages often have built-in connections, or links, to other documents, graphics, other web pages, or web sites. true or false?
    9·1 answer
  • What does snap do need the answer now
    10·2 answers
  • Technician A says that S-cams can be left or right handed. Technician B says that S-cam foundation brakes can have one or two an
    15·1 answer
  • im in honors comupter science and one of my questions is evaluate 18% 7 does anyone know how to answer that
    6·1 answer
  • Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _
    13·1 answer
  • Helppppppppppppppppppppppppppppppppp
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!