This topic contains a solution. Click here to go to the answer

Author Question: The two most widely used public key algorithms are RSA and _________ . What will be an ideal ... (Read 52 times)

storky111

  • Hero Member
  • *****
  • Posts: 561
The two most widely used public key algorithms are RSA and _________ .
 
  What will be an ideal response?

Question 2

The _________ was developed by NIST and published as a federal information processing standard in 1993.
 
  What will be an ideal response?



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

sylvia

  • Sr. Member
  • ****
  • Posts: 331
Answer to Question 1

DIFFIE-HELLMAN

Answer to Question 2

SECURE HASH ALGORITHM (SHA)




storky111

  • Member
  • Posts: 561
Reply 2 on: Jul 7, 2018
:D TYSM


skipfourms123

  • Member
  • Posts: 343
Reply 3 on: Yesterday
Great answer, keep it coming :)

 

Did you know?

Amphetamine poisoning can cause intravascular coagulation, circulatory collapse, rhabdomyolysis, ischemic colitis, acute psychosis, hyperthermia, respiratory distress syndrome, and pericarditis.

Did you know?

Increased intake of vitamin D has been shown to reduce fractures up to 25% in older people.

Did you know?

Only one in 10 cancer deaths is caused by the primary tumor. The vast majority of cancer mortality is caused by cells breaking away from the main tumor and metastasizing to other parts of the body, such as the brain, bones, or liver.

Did you know?

Eating food that has been cooked with poppy seeds may cause you to fail a drug screening test, because the seeds contain enough opiate alkaloids to register as a positive.

Did you know?

The Babylonians wrote numbers in a system that used 60 as the base value rather than the number 10. They did not have a symbol for "zero."

For a complete list of videos, visit our video library