1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alexdok [17]
3 years ago
11

MD5 uses a hash value to create a hash which is typically a 32 character hex number and how many bits?

Computers and Technology
1 answer:
ryzh [129]3 years ago
8 0

Answer:

128 bits

Explanation:

The MD5, which is the acronym for Message-Digest algorithm 5, invented by a professor of MIT, Ronald Rivest, is a cryptographic hash algorithm that creates a 128 bit hash value and is typically represented as a 32 character hex number. MD5 is the improved version of MD4 which was also created by the same professor.

Following is an example format of an MD5 hash;

<em>ef55d3a698d289f2afd663725127bccc</em>

MD5 has been proven to have security issues. One of these issues is called collision attack - a situation where the same hash is produced for different input data.

You might be interested in
Just a quick question, how do you set something == to char and int in an if statement (java)
Troyanec [42]

This is the requested code in java.

public class <em>CharTest</em> {

   public static String checkCharacter(String text, int index) {

       if (0 <= index && index <= text.length()) {

           char ch = text.charAt(index);

           if (Character.isLetter(ch)) {

               return ch + " is a letter";

           } else if (Character.isDigit(ch)) {

               return ch + " is a digit";

           } else if (Character.isWhitespace(ch)) {

               return ch + " is a whitespace character";

           } else {

               return ch + " is an unknown type of character";

           }

       } else {

           return "index " + index.toString() + " is out of range";

       } // <em>end if</em>

   } // <em>end function checkChar()</em>

   public static void <em>main</em>(String[] args) {

       // <em>Test the three samples from the specification.</em>

       System.out.println(<em>checkCharacter</em>("happy birthday", 2));

       System.out.println(<em>checkCharacter</em>("happy birthday", 5));

       System.out.println(<em>checkCharacter</em>("happy birthday 2 you", 15));

   } // <em>end function main()</em>

} // <em>end class CharTest</em>

The function <em>checkcharacter</em>(text, index) returns a string value describing the kind of character found at the position in text specified by index; whether it was a letter, digit, whitespace, or an unknown kind of character.

How it does that is to make use of respective functions defined within the Character class in java. That is

  • isLetter(char) returns a bool specifying if the char parameter is a letter.
  • isDigit(char) returns a bool specifying if the char parameter is a digit.
  • isWhitespace(char) returns a bool specifying if the char parameter is a whitespace character.

It calls these functions in an if statement. These else part of the if statement is then executed if the character is neither a <em>letter</em>, <em>digit</em>, or <em>whitespace</em>.

Finally, the function main() calls <em>checkCharacter</em>() three times to test the function and return the results to the console.

Another example of a java program on characters is found in the link below

brainly.com/question/15061607

3 0
3 years ago
Graded Assignments may be found at the end of each chapter of the required textbook under the title "Real-World Exercises". Each
mina [271]
Ok chapter 2 be done by 11:59
5 0
3 years ago
A coffee shop is considering accepting orders and payments through their phone app and have decided to use public key encryption
Charra [1.4K]

Answer: Yes

Explanation:

Public key encryption is the encryption technique that is used for private keys and public keys for securing the system.Public key is used for encryption and private key is for decryption.Public keys can only open content of the system

  • According to the question, public key encryption is secure for coffee shop customer payment process as they are stored on digital certificates in long form for verifying digital signature and encrypting information.Its computation is difficult to crack through power computer access.  
  • Other options is incorrect as encryption is not a problem for payment procedures. Thus, the correct option is yes ,public key encryption is secure method for coffee shop customers .
8 0
3 years ago
Match the appropriate color mode with the correct definition
Gemiola [76]

Answer:

1.RGB: Best for projects intended to be used on the web or video

Explanation:

On websites or making project RGB combination of colors is used. This combination of colors is used to store images in electronic components.

2. CMYK: best for professional printing projects using process colors

Explanation:

Printing professional use CMYK combinations of color for better printing results.

3.) indexed:The only colors saved are the colors used in the image

To manage digital images we use Indexed mode of colors.

Explanation:

4.) bitmap: uses black and white

Explanation:

bitmap is the combination of the black and white colors. As the images are large in size so that, to reduce the size of the image we store image in bitmap to reduce the size.

5.) gray scale: uses different shades of grey

Explanation:

The different shades of gray colors are found in the gray scale. These shades are used to produce images.

4 0
3 years ago
What patterns do you find within the fractions in the inch on the ruler?
PtichkaEL [24]

Answer:

The markings on a standard ruler represent the fractions of an inch. The markings on a ruler from the start to the 1″ mark are: 1⁄16“, 1⁄8“, 3⁄16“, 1⁄4“, 5⁄16“, 3⁄8“, 7⁄16“, 1⁄2“, 9⁄16“, 5⁄8“, 11⁄16“, 3⁄4“, 13⁄16“, 7⁄8“, 15⁄16“, and 1”.

8 0
3 years ago
Other questions:
  • Is a procedure to copy one or more files from backup media to the original disk or a replacement disk when data or programs have
    8·1 answer
  • The area on your screen where you can access the tab and menu options for word is called what?
    8·2 answers
  • What is java Encapsulation?​
    6·1 answer
  • Double bar graphs compare multiple what
    11·1 answer
  • A representation of something by using a description, summary or image.
    7·1 answer
  • Convert 128 GB into KB​
    8·2 answers
  • HELP!!!
    11·2 answers
  • Indicate if the statement is true or false False 1. A spreadsheet cannot recalculate after you have changed data in your workshe
    15·1 answer
  • Give three examples of NON-TRADITIONAL web authoring tools<br> 3 pour
    14·1 answer
  • Kate saves her work on a secondary storage device that is fairly new, and uses flash technology instead of disks.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!