This topic contains a solution. Click here to go to the answer

Author Question: The two most widely used public key algorithms are RSA and _________ . What will be an ideal ... (Read 31 times)

storky111

  • Hero Member
  • *****
  • Posts: 561
The two most widely used public key algorithms are RSA and _________ .
 
  What will be an ideal response?

Question 2

The _________ was developed by NIST and published as a federal information processing standard in 1993.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

sylvia

  • Sr. Member
  • ****
  • Posts: 331
Answer to Question 1

DIFFIE-HELLMAN

Answer to Question 2

SECURE HASH ALGORITHM (SHA)




storky111

  • Member
  • Posts: 561
Reply 2 on: Jul 7, 2018
Thanks for the timely response, appreciate it


recede

  • Member
  • Posts: 315
Reply 3 on: Yesterday
:D TYSM

 

Did you know?

Autoimmune diseases occur when the immune system destroys its own healthy tissues. When this occurs, white blood cells cannot distinguish between pathogens and normal cells.

Did you know?

Amphetamine poisoning can cause intravascular coagulation, circulatory collapse, rhabdomyolysis, ischemic colitis, acute psychosis, hyperthermia, respiratory distress syndrome, and pericarditis.

Did you know?

During the twentieth century, a variant of the metric system was used in Russia and France in which the base unit of mass was the tonne. Instead of kilograms, this system used millitonnes (mt).

Did you know?

As the western states of America were settled, pioneers often had to drink rancid water from ponds and other sources. This often resulted in chronic diarrhea, causing many cases of dehydration and death that could have been avoided if clean water had been available.

Did you know?

The horizontal fraction bar was introduced by the Arabs.

For a complete list of videos, visit our video library