Author Question: As with symmetric encryption, there are two approaches to attacking a secure hash function: ... (Read 75 times)

jilianpiloj

  • Hero Member
  • *****
  • Posts: 521
As with symmetric encryption, there are two approaches to attacking a secure hash function: brute-force attack and ___________ .
 
  What will be an ideal response?

Question 2

The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
 
  What will be an ideal response?



b614102004

  • Sr. Member
  • ****
  • Posts: 320
Answer to Question 1

CRYPTANALYSIS

Answer to Question 2

PUBLIC-KEY



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Patients should never assume they are being given the appropriate drugs. They should make sure they know which drugs are being prescribed, and always double-check that the drugs received match the prescription.

Did you know?

For pediatric patients, intravenous fluids are the most commonly cited products involved in medication errors that are reported to the USP.

Did you know?

Serum cholesterol testing in adults is recommended every 1 to 5 years. People with diabetes and a family history of high cholesterol should be tested even more frequently.

Did you know?

The human body produces and destroys 15 million blood cells every second.

Did you know?

Elderly adults are living longer, and causes of death are shifting. At the same time, autopsy rates are at or near their lowest in history.

For a complete list of videos, visit our video library