Answer:
message confidentiality
Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.
message integrity
The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.
Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.
Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.
Explanation:
Answer:
A hash function is a function which when given a key, generates an address in the table. The example of a hash function is a book call number. Each book in the library has a unique call number. ... The later is always possible only if you know (or approximate) the number of objects to be proccessed.
Explanation:
A
Answer:
President Kennedy
Explanation:
John F. Kennedy was the 35th President of US. He was assassinated in 1963 in Dallas
Answer:
Enter time 1 HH:MM:SS8:5:22
Enter time 2 HH:MM:SS7:24:37
0:40:45
Explanation:
The program for above in Python is:
from datetime import datetime
s1 = input("Enter time 1 HH:MM:SS")
s2 = input("Enter time 2 HH:MM:SS")
Format1 = '%H:%M:%S'
tdiff = datetime.strptime(s1, Format1) - datetime.strptime(s2, Format1)
print(tdiff)
We are using the datetime class in datetime module for using strptime to find the difference between the two times.
hold doen your power butten and volume butten