1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
7

You hash a symmetric key and store the hash on your workstation. You call your friend and verbalize the symmetric key to him or

her. Your friend then hashes the key using the exact same hash algorithm that you used (without random salting or anything clever). He or she sends you the hash which when you compare with your version of the hash, you find they are not the same hash. From this you conclude that:________
a. Your friend must have been on a different operating system which resulted in a slightly different implementation of the algorithm.
b. Your friend must have mis-typed the key when you verbalized it over the phone.
c. Your friend must have decrypted your hash to find the key before re-hashing.
d. Your friend must have double-hashed the key
Computers and Technology
1 answer:
Nostrana [21]3 years ago
3 0

Answer:

From this you conclude that:________

b. Your friend must have mistyped the key when you verbalized it over the phone.

Explanation:

Since symmetric keys use the same cryptographic keys for both the encryption of plain text and the decryption of ciphertext, we could conclude that there was a mistake in the key my friend typed and the symmetric key that he received.  If not, the hash value that my friend produced must have been the same with what I produced when I did the comparison.

You might be interested in
To format an individual sparkline, select the sparkline you want to format, and then click the Ungroup button in the Group group
vichka [17]

Answer:

The answer is "Option a"

Explanation:

A Sparkline is a small graph, which is available inside a sheet, that displays information visually. It displays the information is in the form of patterns on several values. It also uses underline to display the low and high value, use with sparklines, and certain alternatives were wrong, which can be defined as follows:

  • In option b, It is used to define the overall view of data, that's why it is wrong.
  • Option c and Option d both are wrong because, create command is used to create data, or view is used to show that data, they both don't use sparkline option.  
3 0
3 years ago
What are the guided and unguided transmission media and what are the differences?
Ludmilka [50]

Answer:  They are forms of of carrying data from communication devices. The difference is the medium where the signal travels.

Explanation:

Hi, the difference between guided and unguided media is that in the guided media, the signal travels through a physical medium whereas, in unguided media, the signal travels through the air.  

Guided and unguided media are types of transmission media.

The transmission media carries electromagnetic signals, that transmit data between communicating devices like computers.

4 0
3 years ago
A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high s
Montano1993 [528]

Answer: This is private IP address

Explanation:

192.168.25.10 is a private IP address and is reserved for use only within an organisation so it cannot be used to communicate with the outside world. So in order to have videoconferencing they have to share their public IP addresses.

4 0
3 years ago
Discuss the relationship amongst the following basic file elements: • Field. • Record. • File. • Database. • Directory.​
Gwar [14]

Answer:

describe two events from the life of the prophet that illustrate the way he treated non muslims3+15-75+375.

Explanation:

53+15-75+3756,1803+15-75+375describe two events from the life of the prophet that illustrate the way he treated non muslims

4 0
2 years ago
Joe has just started the Security Module. He wants to get through it as quickly as possible and take the Quiz. As he clicks thro
Scorpion4ik [409]

Answer:

Joe should read the explanatory text and complete the learning activities.

Explanation:

Given

See attachment for options

Required

Best strategy to get through the module

First off, rushing through the activities and taking guess for each question (as suggested by (a)) will not help him;

He may complete the activities but sure, he won't learn from the module.

Also, reading through the units without completing the activities is not an appropriate method because Joe will not be able to test his knowledge at the end of the module.

The best strategy to employ is to read through the units and complete the activities, afterwards (option (b)).

4 0
3 years ago
Other questions:
  • Which key is used in word processors to create indentations?
    13·2 answers
  • What can you use with your keywords to narrow your search if you complete an internet search using a search engine and do not ge
    15·2 answers
  • A Unit of information containing the objects position, rotation, and scale values is called:
    13·1 answer
  • Omar wants to know how his organization has been doing financially over the last year. He wants to also compare this information
    5·2 answers
  • Identify the correct sequence of steps to change the font from Verdana to Arial.
    10·1 answer
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • If we want to access files located in a directory on a remote server, which of these options would we use?
    9·2 answers
  • Coding with Loops Worksheet
    13·2 answers
  • What are two differences between a wide angle lens and a telephoto lens?
    5·2 answers
  • Draw a flowchart that solve the problem of calculating the average of 5 numbers.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!