subject

2. After your explanation in part 1), Barney agrees to use SHA-2 for hashing. However, to save space he proposes to only use the first 128 bits to create a 128 bit hash. He argues that since 128 bit encryption keys are secure, a 128 bit hash should also be secure. Explain what kind of attack a 128 bit hash would be vulnerable to, and why.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 00:30
Jenny wants to look at row 345 and compare it to row 17. what can she do if she wanted to easily adjust to see both at once?
Answers: 3
question
Computers and Technology, 22.06.2019 18:00
Martha is a healer, a healthcare provider, and an experienced nurse. she wants to share her daily experiences, as well as her 12 years of work knowledge, with people who may be interested in health and healing. which mode of internet communication can martha use?
Answers: 3
question
Computers and Technology, 23.06.2019 02:30
Rafael needs to add a title row to a table that he has inserted in word. what should he do? use the alignment options. use the merge and center option for all the cells in the top row. use the merge and center option on the first two cells in the top row. none of the above
Answers: 3
question
Computers and Technology, 24.06.2019 15:30
What is the function of compilers and interpreters? how does a compiler differ from an interpreter?
Answers: 2
You know the right answer?
2. After your explanation in part 1), Barney agrees to use SHA-2 for hashing. However, to save space...
Questions
question
Spanish, 27.08.2019 21:30
question
Computers and Technology, 27.08.2019 21:30
question
Spanish, 27.08.2019 21:30
Questions on the website: 13722361