1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
7

You hash a symmetric key and store the hash on your workstation. You call your friend and verbalize the symmetric key to him or

her. Your friend then hashes the key using the exact same hash algorithm that you used (without random salting or anything clever). He or she sends you the hash which when you compare with your version of the hash, you find they are not the same hash. From this you conclude that:________
a. Your friend must have been on a different operating system which resulted in a slightly different implementation of the algorithm.
b. Your friend must have mis-typed the key when you verbalized it over the phone.
c. Your friend must have decrypted your hash to find the key before re-hashing.
d. Your friend must have double-hashed the key
Computers and Technology
1 answer:
Nostrana [21]3 years ago
3 0

Answer:

From this you conclude that:________

b. Your friend must have mistyped the key when you verbalized it over the phone.

Explanation:

Since symmetric keys use the same cryptographic keys for both the encryption of plain text and the decryption of ciphertext, we could conclude that there was a mistake in the key my friend typed and the symmetric key that he received.  If not, the hash value that my friend produced must have been the same with what I produced when I did the comparison.

You might be interested in
Why are there more producers then consumers?​
Ivanshal [37]

Answer:

because producer can make their own food

6 0
3 years ago
Read 2 more answers
If you create an object using Java’s BigDecimal class, and then perform a division that results in a non-terminating decimal div
azamat

Answer:

Arithmetic Exception is the correct answer to the following blank.

Explanation:

Because the BigDecimal class is the class of the Java Programming Language that deal with the double data type numbers for the arithmetic expressions and also for the format conversions and it is the math type class of the Java Programming language which is used in arithmetic operations. So, that's why the following answer is not wrong.

3 0
3 years ago
Select the phrases that apply to Java classes or methods.
oee [108]

Answer:

graficar una lista de entradas

graficar una lista de entradas

crear un nuevo objeto

condiciones de prueba

romper un ciclo

romper un ciclo

Explanation:

7 0
3 years ago
Social engineering attacks can be carried out:______.
Alik [6]
The answer most likely B NOT SURE )
3 0
3 years ago
PLEASE HELP
gayaneshka [121]
Girl this happened to me too but all I did was try to look up info on things or examples to know how to do the work and stuff
7 0
3 years ago
Read 2 more answers
Other questions:
  • During the processing stage what does the computer do
    12·1 answer
  • What is one way for an entrepreneur to decrease risk?
    8·1 answer
  • How can you logout your account and do not want to have this anymore
    12·2 answers
  • The physical parts or components of a computer system is called?
    8·2 answers
  • Microsoft Excel is an example of a(n) application.
    11·2 answers
  • Why don’t the ads on Brainly load anymore
    14·2 answers
  • HELP PLZZ WILL MARK BRAINLIEST
    9·1 answer
  • The pinky finger on the right hand types _____.
    15·2 answers
  • Describe a NIC card and can you have more than one?
    13·1 answer
  • A leading global vendor Of computer software hardware for computer mobile and gaming systems and cloud services it's corporate h
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!