1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
topjm [15]
3 years ago
6

You and your friend who lives far away want to fairly and randomly select which of the two of you will travel to the other’s hom

e for a visit. Your friend remembers having learned about using hashes as cryptographic commitments and proposes to use a coin toss to decide. He tells you to randomly choose ‘heads’ or ‘tails’ by throwing a coin, hash the result using sha256, and send him the hash. Once you have committed to the outcome, he’ll guess ‘heads’ or ‘tails’, you’ll reveal to him your choice and he can verify that the hash is correct. If his choice matches your coin toss, then your friend wins and you have to make the trip. What is the problem with this scheme, as described?
a.there’s no way to prove that your coin toss is random
b.there’s no way to prove that sha256 is collision resistant
c.your friend can hash all possible options and discover your secret
d.unless you sign the hash message your friend can’t be sure it was you who sent it
Computers and Technology
1 answer:
Phantasy [73]3 years ago
6 0

Answer:

c. your friend can hash all possible options and discover your secret.

Explanation:

SHA-256 is a set of hash functions that was designed by the NSA. SHA-2 is considered an upgrade on the set that was its predecessor, SHA-1. A hash is a mathematical function that condenses data in a process of one-way encryption. SHA-256 creates hash algoritms that are considered irreversible and unique. However, one of the properties of hashing algorithms is determinism, which means that any computer in the world would be able to compute a particular hash and get the same answer.

You might be interested in
The _____ stage occurs when advancing IT leads to the development of a more advanced IT product making the old one obsolete and
Nikolay [14]

Answer

decline

Explanation:

The decline stage is the period where the relevance of a Technology making way for more advanced technology.

6 0
3 years ago
is skill in using productivity software, such as word processors, spreadsheets, database management systems, and presentation so
Digiron [165]

Answer:

It is general knowledge

Explanation:

What you covered is general knowledge and the entrance to computer science.

4 0
3 years ago
Why header files are needed in every c program ?expalin​
bonufazy [111]

Answer:

Header files serve two purposes. System header files declare the interfaces to parts of the operating system. You include them in your program to supply the definitions and declarations you need to invoke system calls and libraries.

6 0
2 years ago
In the game Singularity, broken objects can be restored to their original condition by reversing time. This is an example of whi
Zolol [24]

Solution:

In the game Singularity, broken objects can be restored to their original condition by reversing time. This is an example of which time element of player adjustment.

Thus the required answer is player adjusted.

6 0
3 years ago
Read 2 more answers
Suppose for the worst case, given input size n: Algorithm 1 performs f(n) = n2 + n/2 steps Algorithm 2 performs f(n) = 12n + 500
melomori [17]

Answer:

29

Explanation:

for n=28:

--------------

Algorithm 1 performs f(n) = n2 + n/2 = 28*28 + 28/2 = 798

Algorithm 2 performs f(n) = 12*28 + 500 = 836

for n=29

--------------

Algorithm 1 performs f(n) = n2 + n/2 = 29*29 + 29/2 = 855.5

Algorithm 2 performs f(n) = 12*29 + 500 = 848

so, for n=29, algorithm 2 will be faster than algorithm 1

6 0
3 years ago
Other questions:
  • Carolyn owns a small business that designs air conditioning units for large buildings. A construction company that's building an
    13·1 answer
  • Florida revoked __________ drivers licenses for DUI in a one-year period from 2009 to 2010.
    6·2 answers
  • Text messaging is an example of nonverbal communication. Please select the best answer from the choices provided. T F
    7·2 answers
  • What makes iron man different from other superheroes ? why is iron man the best superhero ??
    5·2 answers
  • Power delivered to the hitch of tractors is called
    12·1 answer
  • 8. A sprite is a simple spider shaped thing with n legs coming out from a center point. The angle
    10·1 answer
  • The template code provided is intended to check whether an integer entered by the user is outside of the range 20-29 (inclusive)
    9·1 answer
  • A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
    15·1 answer
  • 1. Identify one modern technology and discuss its development and discuss what future changes might occur that could have an eve
    13·1 answer
  • What software application is most appropriate to use to create multimedia presentations?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!