Author Question: As with symmetric encryption, there are two approaches to attacking a secure hash function: ... (Read 36 times)

jilianpiloj

  • Hero Member
  • *****
  • Posts: 521
As with symmetric encryption, there are two approaches to attacking a secure hash function: brute-force attack and ___________ .
 
  What will be an ideal response?

Question 2

The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
 
  What will be an ideal response?



b614102004

  • Sr. Member
  • ****
  • Posts: 320
Answer to Question 1

CRYPTANALYSIS

Answer to Question 2

PUBLIC-KEY



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Stevens-Johnson syndrome and Toxic Epidermal Necrolysis syndrome are life-threatening reactions that can result in death. Complications include permanent blindness, dry-eye syndrome, lung damage, photophobia, asthma, chronic obstructive pulmonary disease, permanent loss of nail beds, scarring of mucous membranes, arthritis, and chronic fatigue syndrome. Many patients' pores scar shut, causing them to retain heat.

Did you know?

Amphetamine poisoning can cause intravascular coagulation, circulatory collapse, rhabdomyolysis, ischemic colitis, acute psychosis, hyperthermia, respiratory distress syndrome, and pericarditis.

Did you know?

The Romans did not use numerals to indicate fractions but instead used words to indicate parts of a whole.

Did you know?

Nearly all drugs pass into human breast milk. How often a drug is taken influences the amount of drug that will pass into the milk. Medications taken 30 to 60 minutes before breastfeeding are likely to be at peak blood levels when the baby is nursing.

Did you know?

According to the Migraine Research Foundation, migraines are the third most prevalent illness in the world. Women are most affected (18%), followed by children of both sexes (10%), and men (6%).

For a complete list of videos, visit our video library