1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
7

You hash a symmetric key and store the hash on your workstation. You call your friend and verbalize the symmetric key to him or

her. Your friend then hashes the key using the exact same hash algorithm that you used (without random salting or anything clever). He or she sends you the hash which when you compare with your version of the hash, you find they are not the same hash. From this you conclude that:________
a. Your friend must have been on a different operating system which resulted in a slightly different implementation of the algorithm.
b. Your friend must have mis-typed the key when you verbalized it over the phone.
c. Your friend must have decrypted your hash to find the key before re-hashing.
d. Your friend must have double-hashed the key
Computers and Technology
1 answer:
Nostrana [21]3 years ago
3 0

Answer:

From this you conclude that:________

b. Your friend must have mistyped the key when you verbalized it over the phone.

Explanation:

Since symmetric keys use the same cryptographic keys for both the encryption of plain text and the decryption of ciphertext, we could conclude that there was a mistake in the key my friend typed and the symmetric key that he received.  If not, the hash value that my friend produced must have been the same with what I produced when I did the comparison.

You might be interested in
Please help me with these short questions >..
Thepotemich [5.8K]

Answer:

bmjcmbbobnkpkkjkbk

Explanation:

vuvkopbbkvkhovjlplbkp

6 0
3 years ago
Help me out on question 29 and 30 please
Elanso [62]

Answer:

It 5

Explain

number 28 is A and number 29 is 5

5 0
3 years ago
Write an application that reads the lengths of the sides of a triangle from the user. compute the area of the triangle using her
zlopas [31]

Here you go,


import java.util.Scanner;

import java.util.Random;

public class OrderCalculator{


public static void main(String[] args){  


float x, y, z, semi, area;

Scanner in = new Scanner(System.in);

System.out.print("Enter the 3 sides: ");

x = in.nextFloat();

y = in.nextFloat();

z = in.nextFloat();

semi = (float) ((x + y + z) / 2.0);

area = (float) Math.sqrt(semi * (semi - x) * (semi - y) * (semi - z));

System.out.printf("The area is: %.3f\n", area);


}

}

3 0
3 years ago
What would be a situation in which you could use an Excel chart to present your data?
Minchanka [31]
The second one is correct
5 0
3 years ago
Read 2 more answers
Images of movies are common types of software true or false
topjm [15]

Answer:

True

Explanation:

3 0
3 years ago
Other questions:
  • All of the following are types of data storage devices except CD/DVD computer monitor digital cameras flash drive
    15·1 answer
  • How can development in ICT be utilized to speed up the development and integration efforts
    15·1 answer
  • What do you like most about brainly?
    13·2 answers
  • You want to find information about Paris, France in the last five years, written in English. What is the best way to search for
    5·2 answers
  • Write a procedural programming loop.. Your loop should start variable n with a value of 10 and count down to zero. The loop shou
    10·1 answer
  • I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
    6·2 answers
  • Design 3 classes: Computer - Superclass
    11·1 answer
  • What is a non-example of job outlook.
    7·1 answer
  • How do professionals address their problems?
    14·2 answers
  • question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!