1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kifflom [539]
3 years ago
11

Secure Hashing Algorithm (SHA) is an algorithm for generating cryptographically secure one-way hash, published by the National I

nstitute of Standards and Technology as a U.S. Federal Information Processing Standard. What is the block (word) size used by SHA-512 algorithm?
32-bit
64-bit
128-bit
256-bit
Computers and Technology
1 answer:
Naily [24]3 years ago
8 0

Answer:

64 byte.

It's not bit is byte.

Explanation:

Secure Hash Algorithms (SHA) :- These are a family of cryptographic hash functions. There are basically four types of secure hash algorithms for generating cryptographically secure one-way hash.They are as following:-

SHA-0

SHA-1

SHA-2

SHA-3

SHA -2 consists of SHA-512 and the block size used by it is 64 byte or 512 bits.

You might be interested in
Explain the advantages of taking the aspire test
Len [333]

<span>The Aspire test plan is similar to the ACT </span>plan but they have different goals and format. The ACT was simply a readiness test and seeks to assess your academic progress. The Aspire, on the other hand, focuses more on critical and creative thinking. It is a good way to judge your progress but it won’t affect your applications to college admissions and scholarship.

8 0
4 years ago
How many bits are required to encode an image that is 25 pixels wide and 50 pixels tall, if you encode each pixel with 12 bits o
AURORKA [14]

Just multiply all numbers to get the total number of bits:

25*50*12 = 15000 bits.

3 0
3 years ago
A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not
Ghella [55]

Answer:

B. NIDS

Explanation:

From the question we are informed about A network manager is interested in a device that watches for threats on a network but does not act on its own, and also does not put a strain on client systems. The BEST device to meet these requirements is NIDS. Network intrusion detection system known as "NIDS" can be regarded as a system that can attempt in detection of hacking activities as well as denial of attack on computer network. It can monitor network traffic and can as well detect malicious activities through identification of suspicious patterns in any incoming packet.

3 0
3 years ago
In cell B20, enter a
zzz [600]

Answer:

かあなたは棚田やヌタほたややあはあやあやあさあ与田弥太は沙汰やあはあわあね、田やホワアラハやくださいヤアカやさ矢田かほあや体は白湯のやさた

Explanation:

なたさたらなやさゆなやさら

5 0
2 years ago
I need someone who knows HTML to finish the code.
Maksim231197 [3]
I recommend you go to Stacks Overflow . There are many experienced coders there that would gladly answer your question.
7 0
3 years ago
Read 2 more answers
Other questions:
  • . Alex discovered a bunch of SATA drives in a box at the office and needs to check the contents. What can he do so that Windows
    13·1 answer
  • Write a simple compilable program that outputs to an Excel-compatible XLS file these two rows: (1) a header row with headings fo
    10·1 answer
  • Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k ti
    8·1 answer
  • Which domain ending can only be used by the U.S. government?
    14·2 answers
  • 1. Before operating any power tool, you need to
    14·1 answer
  • What is the name of the most common connector type used for providing power to various hardware components inside computer case?
    10·1 answer
  • WHHY AM I GIVING POINTS AWAY
    7·1 answer
  • Como se juega robótica de cokitos
    13·1 answer
  • Trong mạng internet, chúng tôi thay đổi công nghệ mạng LAN sang một công nghệ
    5·1 answer
  • 1. Wash all work surfaces with a_______ wrung in hot soapy water.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!