1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
7

You hash a symmetric key and store the hash on your workstation. You call your friend and verbalize the symmetric key to him or

her. Your friend then hashes the key using the exact same hash algorithm that you used (without random salting or anything clever). He or she sends you the hash which when you compare with your version of the hash, you find they are not the same hash. From this you conclude that:________
a. Your friend must have been on a different operating system which resulted in a slightly different implementation of the algorithm.
b. Your friend must have mis-typed the key when you verbalized it over the phone.
c. Your friend must have decrypted your hash to find the key before re-hashing.
d. Your friend must have double-hashed the key
Computers and Technology
1 answer:
Nostrana [21]3 years ago
3 0

Answer:

From this you conclude that:________

b. Your friend must have mistyped the key when you verbalized it over the phone.

Explanation:

Since symmetric keys use the same cryptographic keys for both the encryption of plain text and the decryption of ciphertext, we could conclude that there was a mistake in the key my friend typed and the symmetric key that he received.  If not, the hash value that my friend produced must have been the same with what I produced when I did the comparison.

You might be interested in
What section in an ethernet frame will you find a Virtual Local Area Network (VLAN) header?
Vadim26 [7]

Answer:

Preamble

Explanation:

In the computer network , the ether-net is the frame of link layer protocol data. This frame is used ether net with physical layer of transport mechanism. The ether net frame is of different type.

  • The ether-net II
  • The Novel raw IEEE 802.3
  • IEEE 802.2 LLC
  • IEEE 802.2 SNAP

Each of the Ethernet frame started from Ether net header. It contains the source and the destination. The MAC address is called its first two address.

8 0
3 years ago
what is the best paper choice for printing a book with 1000 pages A. Cover B. Text C. Index D. Newsprint​
Eva8 [605]

Answer:

B

Explanation:

Text is the best paper choice.

Have a great day

3 0
2 years ago
What is the user requirements of an educational app
VARVARA [1.3K]
Ummmmm I don’t know but I wanna know now.....
7 0
3 years ago
Zachary is a member of Future Business Leaders of America at his school and is competing in the Impromptu Speaking competition.
Scrat [10]

Answer:

c start off with a story

Explanation:

I just took the test

4 0
3 years ago
Read 2 more answers
Sudden changes in _____ especially in high humidity conditions may cause condensation inside the camera and spoil it
Diano4ka-milaya [45]

Sudden changes in temperature especially in high humidity conditions may cause condensation inside the camera and spoil it.

<u>Explanation:</u>

When the temperature changes suddenly, it will affect the camera lens through condensation.  Condensation when it is caused only for few rounds, the camera will not be damages. But, when the process of condensation continues top exists it will definitely ruin and damage the camera.

Condensation affects the internal functionalities of a camera.  When a camera is brought from an environments where it is cold and dry, it will be affected by condensation during the period of summer. This is because it will be hot and this causes sudden change ion the temperature. Thus, it the changes in the environment temperature that causes damages to camera.

3 0
3 years ago
Other questions:
  • Many companies use software to scan resumes and search for _____________.
    10·1 answer
  • Lisa wants to send an email with some confidential Information. Which of these options would work best for her?
    6·1 answer
  • Draw a logic circuit for the function F = (A + B)(B + C)(A + C), using NOR gates only. ​
    9·1 answer
  • What is the encryption cipher that was the precursor to des??
    5·1 answer
  • The I/O modules take care of data movement between main memory and a particular device interface.A. TrueB. False
    9·1 answer
  • How many constructors are there in the following class declaration?class CashRegister { public: CashRegister(); CashRegister(int
    8·1 answer
  • Define online pollution
    5·1 answer
  • If you were practicing keyboarding and the exercise contained the letters j, k, l, m, n, and b, what section of the
    14·1 answer
  • HELP ME ⚠️‼️⚠️‼️ DUE IN EXACTLY 27 MINUTES
    6·1 answer
  • r packages include sample datasets. they also include reusable r functions and documentation about how to use the functions. Tru
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!