Author Question: As with symmetric encryption, there are two approaches to attacking a secure hash function: ... (Read 74 times)

jilianpiloj

  • Hero Member
  • *****
  • Posts: 521
As with symmetric encryption, there are two approaches to attacking a secure hash function: brute-force attack and ___________ .
 
  What will be an ideal response?

Question 2

The __________ approach has two advantages: it provides a digital signature as well as message authentication and it does not require the distribution of keys to communicating parties.
 
  What will be an ideal response?



b614102004

  • Sr. Member
  • ****
  • Posts: 320
Answer to Question 1

CRYPTANALYSIS

Answer to Question 2

PUBLIC-KEY



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Oxytocin is recommended only for pregnancies that have a medical reason for inducing labor (such as eclampsia) and is not recommended for elective procedures or for making the birthing process more convenient.

Did you know?

Interferon was scarce and expensive until 1980, when the interferon gene was inserted into bacteria using recombinant DNA technology, allowing for mass cultivation and purification from bacterial cultures.

Did you know?

Recent studies have shown that the number of medication errors increases in relation to the number of orders that are verified per pharmacist, per work shift.

Did you know?

It is believed that humans initially contracted crabs from gorillas about 3 million years ago from either sleeping in gorilla nests or eating the apes.

Did you know?

The human body's pharmacokinetics are quite varied. Our hair holds onto drugs longer than our urine, blood, or saliva. For example, alcohol can be detected in the hair for up to 90 days after it was consumed. The same is true for marijuana, cocaine, ecstasy, heroin, methamphetamine, and nicotine.

For a complete list of videos, visit our video library