1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zzz [600]
3 years ago
13

. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Tod

ay, a symmetric session key needs to be 100 bits long to be considered strong. How long will a symmetric session key have to be in 30 years to be considered strong?
Computers and Technology
1 answer:
horsena [70]3 years ago
8 0

Answer:

130 bits

Explanation:

If the length of a key = N bits

Total number of key combinations = \frac{2^{N} }{2}

For a key length of 100, the total number of key combinations will be  \frac{2^{100} }{2} = 2^{99} combinations. This is a whole lot and it almost seems impossible to be hacked.

The addition of  one bit to the length of the symmetric key in 1 year is sufficient to make the key strong, because even at double its speed, the processor can still not crack the number of combinations that will be formed.

Therefore, if a bit is added to the key length per year, after 30 years, the length of the symmetric session key will be 130 bits.

You might be interested in
Select the four tactics that cyber criminals use for stealing information from the list below.
Snowcat [4.5K]
Baiting clickjacking pharming spamming
6 0
2 years ago
When you get ###### or 1.1E+13 as a result in a cell, it means:
Zigmanuir [339]
This simply means that the cell is not wide enough to be able to show all the contents entered into that cell
7 0
3 years ago
One of the files you should now have in your fileAsst directory is TweedleDee/hatter.txt. Suppose that you wished to copy that f
Paha777 [63]

Answer:

cp /path/to/source.txt .

is the general format of copying a file to the current directory

cp ~/UnixCourse/fileAsst/TweedleDee/hatter.txt .

You can refer to the current directory with a dot (.)

Explanation:

First, we would like to delete all files in our current directory (commandsAsst directory). To delete the files inside the directory, we would run the following command:

rm -r commandsAsst/*

This command delete the files recursively. Usually, the command for deleting is rm -r. The operator * run rm -r on every file or directory within commandsAsst.

5 0
3 years ago
While cloud services are useful for small and midsize analytic applications, they are still limited in their ability to handle B
sp2606 [1]

Answer:

False

Explanation:

There are cloud applications which can effectively handle big data.

For example processing and handling big data technologies like Hadoop, Spark can be used on cloud.

Services like <em>Amazon Web Services</em> or <em>Google Cloud Services</em> allows users analyze big data with various tools.

5 0
3 years ago
The library Wi-Fi kiosk requires a symmetric connection to the Internet. Which WAN technology would probably be the least expens
kenny6666 [7]

Answer:

The answer is IP-sec.

Explanation:

0.75 miles of range is a low distance for a WAN (Wide Area Network) so a point-to-point WAN tehcnology such as IP-sec or SD-WAN can be preferred. But the least expensive option would be choosing IP-sec as specified in the question.

I hope this answer helps.

6 0
3 years ago
Other questions:
  • What movie won best picture oscar for 1990
    14·2 answers
  • COMPUTER SCIENCE HELP!!!!!
    6·1 answer
  • What is the process of getting as many people as possible to visit your website called? A. Maximizing keyword potential B. Direc
    9·2 answers
  • List three examples of observations of earth by remote-sensing satellites
    6·1 answer
  • What is a type of destructive program?
    8·2 answers
  • Negative methods of behavior correction include all but this:
    9·1 answer
  • Write c++ program from 1to 100 to find prime numbers using statement.​​
    13·1 answer
  • How is modern technology developed? Explain.
    14·2 answers
  • What is the extension of Photoshop file?​
    7·1 answer
  • Describe the differences and similarities between the most common operating systems used for Mac, PC, and Linux in
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!