Author Question: As with symmetric encryption, there are two approaches to attacking a secure hash function: ... (Read 37 times)

jilianpiloj

  • Hero Member
  • *****
  • Posts: 521
As with symmetric encryption, there are two approaches to attacking a secure hash function: brute-force attack and ___________ .
 
  What will be an ideal response?

Question 2

The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
 
  What will be an ideal response?



b614102004

  • Sr. Member
  • ****
  • Posts: 320
Answer to Question 1

CRYPTANALYSIS

Answer to Question 2

PUBLIC-KEY



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Alzheimer's disease affects only about 10% of people older than 65 years of age. Most forms of decreased mental function and dementia are caused by disuse (letting the mind get lazy).

Did you know?

If you use artificial sweeteners, such as cyclamates, your eyes may be more sensitive to light. Other factors that will make your eyes more sensitive to light include use of antibiotics, oral contraceptives, hypertension medications, diuretics, and antidiabetic medications.

Did you know?

Asthma is the most common chronic childhood disease in the world. Most children who develop asthma have symptoms before they are 5 years old.

Did you know?

This year, an estimated 1.4 million Americans will have a new or recurrent heart attack.

Did you know?

A seasonal flu vaccine is the best way to reduce the chances you will get seasonal influenza and spread it to others.

For a complete list of videos, visit our video library