subject

You hash a symmetric key and store the hash on your workstation. You call your friend and verbalize the symmetric key to him or her. Your friend then hashes the key using the exact same hash algorithm that you used (without random salting or anything clever). He or she sends you the hash which when you compare with your version of the hash, you find they are not the same hash. From this you conclude that: a. Your friend must have been on a different operating system which resulted in a slightly different implementation of the algorithm.
b. Your friend must have mis-typed the key when you verbalized it over the phone.
c. Your friend must have decrypted your hash to find the key before re-hashing.
d. Your friend must have double-hashed the key

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 12:20
When guido van rossum created python, he wanted to make a language that was more than other programming languages. a. code-based b. human-readable c. complex d. functional
Answers: 1
question
Computers and Technology, 24.06.2019 13:30
Which type of excel chart should be used to track students’ progress on test grades? line column bar pie
Answers: 2
question
Computers and Technology, 24.06.2019 20:50
Which key function of a business involves finding, targeting, attracting, and connecting with the right customers?
Answers: 3
question
Computers and Technology, 25.06.2019 10:00
Aline ab is in 1st quadrant , its ends a and b respectively are 20mm and 60mm infront of vp respectively . the distance between the end projectors is 75 mm . the line is inclined at 30 degrees to the hp and end a 20 degrees above the hp . draw its projections , find true length
Answers: 2
You know the right answer?
You hash a symmetric key and store the hash on your workstation. You call your friend and verbalize...
Questions
question
History, 11.10.2020 20:01
question
Social Studies, 11.10.2020 20:01
question
Mathematics, 11.10.2020 20:01
Questions on the website: 13722363