1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
6

You and your friend who lives far away want to fairly and randomly select which of the two of you will travel to the other’s hom

e for a visit. Your friend remembers having learned about using hashes as cryptographic commitments and proposes to use a coin toss to decide. He tells you to randomly choose ‘heads’ or ‘tails’ by throwing a coin, hash the result using sha256, and send him the hash. Once you have committed to the outcome, he’ll guess ‘heads’ or ‘tails’, you’ll reveal to him your choice and he can verify that the hash is correct. If his choice matches your coin toss, then your friend wins and you have to make the trip. What is the problem with this scheme, as described?
a.there’s no way to prove that your coin toss is random
b.there’s no way to prove that sha256 is collision resistant
c.your friend can hash all possible options and discover your secret
d.unless you sign the hash message your friend can’t be sure it was you who sent it
Computers and Technology
1 answer:
Phantasy [73]3 years ago
6 0

Answer:

c. your friend can hash all possible options and discover your secret.

Explanation:

SHA-256 is a set of hash functions that was designed by the NSA. SHA-2 is considered an upgrade on the set that was its predecessor, SHA-1. A hash is a mathematical function that condenses data in a process of one-way encryption. SHA-256 creates hash algoritms that are considered irreversible and unique. However, one of the properties of hashing algorithms is determinism, which means that any computer in the world would be able to compute a particular hash and get the same answer.

You might be interested in
Consider two different implementations of the same instruction set architecture (ISA). The instructions can be divided into four
PSYCHO15rus [73]

Answer: Find answers in the attachments

Explanation:

3 0
3 years ago
Information that indicates ground air or navy force levels or dispositions is what security?
AlexFokin [52]

Information that indicates ground air or navy force levels or dispositions is <u>confidential</u> security.

Security for a country's higher organizations is essential for a nation's protection.

Serious information like the nuclear organizations, army, navy, and ground air is at a higher risk for threats and hence requires higher security.

The information in such higher organizations is kept confidential and no third person is allowed access to the code of conduct of such organizations.

If information is leaked from the ground air or from navy force levels then there can be serious consequences for it. Hence, such information is always kept under confidential security.

To learn more about security, click here:

brainly.com/question/25375059

#SPJ4

8 0
1 year ago
1. Name a two methods for creating text in Adobe Illustrator.
Fittoniya [83]

Answer:

Point type is a horizontal or vertical line of text that begins where you click and expands as you enter characters. Each line of text is independent—the line expands or shrinks as you edit it, but doesn’t wrap to the next line. Entering text this way is useful for adding a few words to your artwork.

Select the Type tool  or the Vertical Type tool .

The pointer changes to an I-beam within a dotted box. The small horizontal line near the bottom of the I-beam marks the position of the baseline, on which the text rests.

(Optional) Set text-formatting options in the Control panel, Character panel, or Paragraph panel.

Click where you want the line of text to begin.

Explanation:

4 0
3 years ago
. An exception is an error that occurs during the execution of a program at run-time that disrupts the normal fow of the Java pr
In-s [12.5K]

Answer: True

Explanation:Exception error ,which is also known as the fatal error that arises when there is the program execution going-on and the error occurs suddenly to stop the processing, resulting in the abortion of the execution.This erruptional error is responsible for disturbing the execution flow as well as there are chances of the data getting lost or deleted automatically.

5 0
3 years ago
Which of the following represents something businesses do to keep the integrity and security of their company data?
iren [92.7K]
I’m not sure but if I wouod have to answer it would be 2 or 3
6 0
2 years ago
Other questions:
  • Which change signaled a musical progression toward rock and roll?
    14·1 answer
  • An employee who interacts with customers regarding the nature of their car problems, rather than actually working on the vehicle
    12·2 answers
  • Pls help me!!!!!!!!!!!!!
    5·2 answers
  • How can an Excel table be added to a Word document? Check all that apply.
    15·1 answer
  • Initialize the tuple team_names with the strings 'Rockets', 'Raptors', 'Warriors', and 'Celtics' (The top-4 2018 NBA teams at th
    9·1 answer
  • Note oj cyber security​
    6·1 answer
  • What is malware? a type of virus that spreads through a network connection a type of virus that targets programs and files any p
    8·1 answer
  • What is the output of the following code snippet if the variable named cost contains 100? if cost &lt; 70 or cost &gt; 150 : dis
    8·1 answer
  • Which of these statements about PNG is true?
    11·2 answers
  • Assignment 10 - 1/0 Streams and Files Create a C++ a program that will compute the average word length (average number of charac
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!