Author Question: As with symmetric encryption, there are two approaches to attacking a secure hash function: ... (Read 77 times)

jilianpiloj

  • Hero Member
  • *****
  • Posts: 521
As with symmetric encryption, there are two approaches to attacking a secure hash function: brute-force attack and ___________ .
 
  What will be an ideal response?

Question 2

The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
 
  What will be an ideal response?



b614102004

  • Sr. Member
  • ****
  • Posts: 320
Answer to Question 1

CRYPTANALYSIS

Answer to Question 2

PUBLIC-KEY



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Atropine was named after the Greek goddess Atropos, the oldest and ugliest of the three sisters known as the Fates, who controlled the destiny of men.

Did you know?

The term bacteria was devised in the 19th century by German biologist Ferdinand Cohn. He based it on the Greek word "bakterion" meaning a small rod or staff. Cohn is considered to be the father of modern bacteriology.

Did you know?

The first oncogene was discovered in 1970 and was termed SRC (pronounced "SARK").

Did you know?

Adult head lice are gray, about ? inch long, and often have a tiny dot on their backs. A female can lay between 50 and 150 eggs within the several weeks that she is alive. They feed on human blood.

Did you know?

Urine turns bright yellow if larger than normal amounts of certain substances are consumed; one of these substances is asparagus.

For a complete list of videos, visit our video library