1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stiv31 [10]
3 years ago
8

What is a block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits?

Computers and Technology
1 answer:
Deffense [45]3 years ago
8 0

The question has the below multiple choices

A) 3DES
B) RSA
C) Blowfish
D) Twofish


The answer is (C) Blowfish

Also known as the Blow-CAST-Fish, it was designed to run efficiently on 32 bit computers. Up to date no significant weaknesses have been seen. Based on Blow-CAST-Fish, it uses good features of CAST -128[6] algorithms and Blowfish [1]. Features taken from Blowfish [1] algorithm include; S-box entries which are key dependent substitution, varying key lengths of up to 448 bits and procedure of Key expansion


You might be interested in
Why would a business consider using virtual machines?
Nuetrik [128]
The answer is A, or To be able to maintain servers remotely. Why? Well, a business would not want to allow outside customers access to files because that’s a blatant red flag. There would be no reason to completely eliminate physical servers because there simply isn’t a reason to. They would not want to secure the company intranet because if they did, their solution would not be to use virtual machines surely.

Your final answer: To be able to maintain servers remotely. It’s slightly more efficient, and it makes sense for the company to be accomplishing this goal by using virtual machines.
7 0
2 years ago
Supplies/material used in iron​
Novay_Z [31]
The raw materials used to produce pig iron in a blast furnace are iron ore, coke, sinter, and limestone. Iron ores are mainly iron oxides and include magnetite, hematite, limonite, and many other rocks. The iron content of these ores ranges from 70% down to 20% or less.
3 0
3 years ago
Corinne is taking a chemistry class in college. A lab assignment asks students to track the melting point of ten different subst
Dmitrij [34]

Answer:

a spreadsheet

Explanation:

The data is of statistical type and is experimentally based. And hence, the spreadsheet is the best kind of software that can be used to register the record. And we can save 10 such experient results with the same format of tables on 10 different worksheets, and if we want we can adjust the readings of the 10 similar experiments at one time. And hence, we can quite effectively record as well as analyze this data on the spreadsheet. Hence, the spreadsheet is the correct option.

4 0
3 years ago
The author of ""Cyber-psychopathy: What Goes On in a Hacker’s Head"" states that a crucial component of computer hacking lies in
slega [8]

Answer: The statement implies that the hackers psychologically manipulate the human to access the information they need.

Explanation: The author states that the hacker does not only exploits technology to get system access or to gather information. But there is another pivotal part of hacking. He refers to this part as "social engineering".

Social engineering from information security perspective means manipulate human emotions and convincing them to disclose some confidential information. Hacker often hacks or defrauds after gaining confidence and trust of a person.

Phishing is an example. It is a fraudulent technique for getting some secret information. Phisher sends an email pretending to be from some reputable organization to persuade people to divulge private information like passwords and credit card numbers, ATM card pin etc.

5 0
3 years ago
On a piano, a key has a frequency, say f0. Each higher key (black or white) has a frequency of f0 * rn, where n is the distance
lesantik [10]

Answer:

In C:

#include <stdio.h>

#include <math.h>

int main(){

   float f0,r,temp;

   r = pow(2.0,1.0/12);

   printf("f0: ");    scanf("%f", &f0);

   temp = f0;

   for(int i = 0; i<=4;i++){

       f0 = f0 * pow(r,i);

       printf("%.2lf ", f0);

       f0 = temp;    }

   return 0;

}

Explanation:

This declares f0, r and temp as float

   float f0,r,temp;

This initializes r to 2^(1/12)

   r = pow(2.0,1.0/12);

This prompts the user for f0

   printf("f0: ");    scanf("%f", &f0);

This saves f0 in temp

   temp = f0;

This iterates the number of keys from 0 to 4

   for(int i = 0; i<=4;i++){

This calculates each key

       f0 = f0 * pow(r,i);

This prints the key

       printf("%.2lf ", f0);

This gets the initial value of f0

       f0 = temp;    }

   return 0;

8 0
3 years ago
Other questions:
  • Which are types of lines? Choose three answers.
    9·1 answer
  • PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, atte
    8·1 answer
  • Which is the lowest Complexity"
    15·1 answer
  • Who controls communication ethics?
    13·1 answer
  • To run a PHP application that has been deployed on your own computer, you can enter a URL in the address bar of your browser tha
    13·1 answer
  • A​ _______ variable is a variable that has a single numerical​ value, determined by​ chance, for each outcome of a procedure.
    7·1 answer
  • When you see this traffic signal is turned on, you may _____________________.
    5·2 answers
  • For your biology class, you have taken a number of measurements for a plant growth experiment. You wish to create a chart that s
    15·1 answer
  • Match the elements used in web searches to their functions.
    12·1 answer
  • Write c++ program from 1to 100 to find prime numbers using statement.<br><br>please help me​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!