1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kipiarov [429]
3 years ago
12

If the contents of encrypted file1.nc and encrypted file3.nc are different, but the original file1 and file3 are the same, and y

ou used the same password and algorithm when encrypting both, what might explain the difference?
Computers and Technology
1 answer:
Over [174]3 years ago
3 0

Answer:

The Difference is because of the salt added to the password before hashing or encrypting it.

Explanation:

The Difference is because of the salt added to the password before hashing or encrypting it.

Salts are random data used to mention uniqueness. Suppose if two users have same password for the same system. By adding Salt to the password makes it unique in the crypto system. Its a added security layer which can safeguard the passwords or hashed data in the keystore or storage.

Salt can be prepended to the password or appended to the password.

Suppose the password is “stuti” then its SHA256 HASH value is <u><em>“4beb1eb6f438495eede7b14ac0d2b955636a49412cd4eb5714341f5716144954”</em></u>

So, if we add a salt with random string <em>brainlysalttest</em> then its SHA256 HASH value is <u><em>“5429e85778f1b9f493da637848f253dedf3edbfbb72782d43eb7337cee45ab0c”</em></u>

If we append the salt <em>brainlytestsalt</em> to the same password and hash it using SHA256 then its hash value is : <u><em>“3919b677d80ae0da2b58f70b464f6492670ccffee78cf52972c6983995ed8f52”</em></u>

So clearly Salting to the password and Hashing the salted password will make the difference and also unique.

You might be interested in
Help i give 20 shekel
Verdich [7]

Answer:hacking a computer is all I know

Explanation:

8 0
3 years ago
According to our definition in this class, computers are define
mario62 [17]

se definen como un medio de estudio en estos momentos de cuarentena

en la que nos ayuda a sentirnos mas cerca de las clases  

5 0
3 years ago
Which setting is used to determine the order of printing pages?
sineoko [7]

Answer:

Collation Settings

Explanation:

In Microsoft Word, we are given several setting options (e.g. Collation, Orientation, Margin and Scaling) to print our documents. Collation is one of the given settings that allows us to adjust the order of printing pages. There are only two options in Collation Setting (Collated or Uncollated). If Collated is chosen, the pages will be printed in sequential order (e.g. Page 1, Page 2 and Page 2) and followed by another copy of pages with same sequential order. On another hand, if Uncollated is chosen, All copies of Page 1 will be printed first then only followed by the Page 2 for all copies and so on.

7 0
4 years ago
In ipv4, datagram fragment might be fragmented again at the next router. re-assembly of these sub-fragments is handled by?
s2008m [1.1K]

In IPv4, the following router could fragment the datagram fragment once more. This sub-fragment reassembling is done by the first router.

<h3>What is ipv4?</h3>
  • The fourth iteration of the Internet Protocol is known as IPv4.
  • The Internet and other packet-switched networks use it as one of its primary core protocols for internetworking.
  • The first production-ready release of IPv4 was made available on the SATNET in 1982 and the ARPANET in January 1983.
  • A protocol for usage on packet-switched Link Layer networks is the Internet Protocol version 4 (IPv4) (e.g. Ethernet).
  • A capacity of roughly 4.3 billion addresses is offered by IPv4.

To learn more about ipv4, refer to:

brainly.com/question/28432421

#SPJ4

5 0
2 years ago
Which computer program can you use to write, edit, print, and perform any modifications to a document?
faltersainse [42]
D. word-processing software
4 0
4 years ago
Read 2 more answers
Other questions:
  • What is the correct order of operations for protecting a critical section using a binary semaphore?
    15·1 answer
  • Which form of Internet access currently uses a technology called 4G?
    15·2 answers
  • Will a pair of bar magnet ,with keepers on the two ends, act as a magnet
    13·1 answer
  • Once the term of copyright has expired,a work
    15·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • What is the purpose of filters in a database?
    11·1 answer
  • Test unit 8 edhesive answers ​
    15·1 answer
  • What is the result when you run the following program?
    9·2 answers
  • PLEASE HELP THIS IS CONFUSING ME
    8·2 answers
  • Question 3 of 10
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!