1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
6

You and your friend who lives far away want to fairly and randomly select which of the two of you will travel to the other’s hom

e for a visit. Your friend remembers having learned about using hashes as cryptographic commitments and proposes to use a coin toss to decide. He tells you to randomly choose ‘heads’ or ‘tails’ by throwing a coin, hash the result using sha256, and send him the hash. Once you have committed to the outcome, he’ll guess ‘heads’ or ‘tails’, you’ll reveal to him your choice and he can verify that the hash is correct. If his choice matches your coin toss, then your friend wins and you have to make the trip. What is the problem with this scheme, as described?
a.there’s no way to prove that your coin toss is random
b.there’s no way to prove that sha256 is collision resistant
c.your friend can hash all possible options and discover your secret
d.unless you sign the hash message your friend can’t be sure it was you who sent it
Computers and Technology
1 answer:
Phantasy [73]3 years ago
6 0

Answer:

c. your friend can hash all possible options and discover your secret.

Explanation:

SHA-256 is a set of hash functions that was designed by the NSA. SHA-2 is considered an upgrade on the set that was its predecessor, SHA-1. A hash is a mathematical function that condenses data in a process of one-way encryption. SHA-256 creates hash algoritms that are considered irreversible and unique. However, one of the properties of hashing algorithms is determinism, which means that any computer in the world would be able to compute a particular hash and get the same answer.

You might be interested in
Which of the following technologies is the best choice to convey urgent and highly sensitive information? telephone fax letter e
snow_lady [41]
Using e-mail to send messages is the best choice to convey urgent and highly sensitive information. E-mail is just a conversation between you and the recipient. So it is the best when it comes to when you are sending a highly sensitive information. While telephone fax letter and dispatch radio may need to use a mediator to transfer messages which violates the confidentiality of the information.
3 0
3 years ago
Which font attribute would be most appropriate to make a papers heading stand out?
eimsori [14]

If you want your heading to pop out I would go for bold Becuase it shows the letters darker and bigger which would make the heading the center of attention.

7 0
3 years ago
Read 2 more answers
This is my new horrible subject lol
AysviL [449]
I’m 98% sure that it is B because customer service would be provided to people who buy from the company and need help
5 0
3 years ago
Describe the three-schema architecture. Why do we need mappings among schema levels? How do different schema definition language
VARVARA [1.3K]

Answer:

Three Scheme architecture contains internal level, conceptual level, and external level.

In the internal level physical structure of the database described. The internal Schema is also known as physical Schema, as it is used to define the data that stored in a block. Internal Schema describes a sophisticated level of data structure in detail.

The conceptual level design of the database has described, and it is known as a logical level. The conceptual level describes the whole structure of the database. It describes the relationships among the data. Implementation of data are hidden in a theoretical level

On the external level, databases contain schemas that represent a different view of the database. Each describes the database that the user interested in and hides the remaining database. The external database is also known as view schema.

Explanation:

The mappings between schema levels happen due to visualization and schema matching. DBMS has three schema level.

In the attached diagram

It shows the DBMS architecture.

Mapping is a way to transfer and respond to the request between the various database architecture.

Mapping takes more time to transfer data in small DBMS.

External / Conceptual mapping transforms the data from the outer level to the conceptual schema.

In Conceptual / Internal mapping, response transforms from conceptual to internal level.

Document Schema Definition Language (DSDL) is a framework in which multiple validations can be applied to achieve a complete validation result. In this way, schema definition language support this architecture.

8 0
3 years ago
Describe psychographic differences among the past five generations of Americans that you learned about in this course. What type
Vlada [557]

Answer:

1

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • The following is true about SPAM ________.
    9·1 answer
  • What is basic function of an operating system?
    10·2 answers
  • The equipment that processes data in order to create information is called the _______.
    8·2 answers
  • 4.5 Code Practice
    15·1 answer
  • Which of the following statements represents the number of columns in a regular two-dimensional array named values?
    9·1 answer
  • What computer worm was used to sabatoge iran's nuclear program?
    11·1 answer
  • A method to accept the number of drawers in the desk as input from the key board. This method returns the number of drawers to t
    13·1 answer
  • Why was the cooper black font made?
    5·1 answer
  • Keira is creating an app for her cross-country team. Users will input their race times and the output will be a graph showing th
    6·1 answer
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!