Function of cryptographic hashing

Assignment Help Basic Computer Science
Reference no: EM13829359

Problem:

1. Which of the following is NOT a function of cryptographic hashing:

a. To provide the input to a signature algorithm
b. To provide "shadow files" for critical security data such as passwords
c. To compress data for efficient transmission
d. To cryptographically bind parameters in a security protocol

2. A masquerade attack on a network involves:

a. Discovering the pattern of traffic between two or more users
b. Changing the contents of a message and sending it to an unsuspecting user
c. Releasing the content of a message to users not holding the corresponding key
d. Sending messages from fraudulent source

Additional Information:

These multiple choice questions is from Computer Science. The 1st question is about function of cryptographic hashing. The 2nd question is about what involves in a masquerade attack on a network.

Reference no: EM13829359

Questions Cloud

Public key cryptography : The format of an X.509 certificate is described in
Purpose of trade union in unitarism theory : Perspective of unitarism. the organization is regarded as an integrated and harmonious group of people with one loyalty culture. In addition, this perspective similar to paternalism has a high requirement for the loyalty of all employees.
Authenticator-data compression-encryption : 1. An authenticator is:
Calculate the rate for the new bond issue : Debt: The firm can sell a 20-year, semi-annual,$1,000 par value, 9 percent bond for $980. A flotation cost of 2 percent of the face value would be required in addition to the discount of $20. Preferred Stock: The firm has determined it can issue pref..
Function of cryptographic hashing : Which of the following is NOT a function of cryptographic hashing:
Security protocol-complexity of differential cryptanalysis : In a security protocol, which of the following tends to make the best nonce?
Determining the decryption exponent for rsa key : Let the public key associated with an RSA key be (3,15) where e = 3 is the encryption exponent, and n = 15 is the modulus. The corresponding decryption exponent d is then
What pricing strategies should be employed : Examine what demographics and coinciding pricing structure should JCPenney be focused on in order to increase sales after a decline from a recent change in strategies
History and implementation of object oriented databases : Write a 3-4 page paper that describes any one of the topics in detail. Include a discussion on the following subject areas and include any graphs.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The highest priority eligible to run will be scheduled

The XINU Operating System currently implements a Pre-emptive Priority Scheduling Algorithm. It follows the idea: 'At any point in time, the highest priority eligible to run will be scheduled'

  Analyze all the costs and benefits of moving to a virtual

Analyze all the costs and benefits of moving to a virtual desktop solution, and propose a minimum of four benefits of the new system over the existing one. Compare and contrast reasons why the company should choose the system you are recommending ove..

  Creating a payoff table for decision

Amy decided to select the best option which will minimize her total 36-month cost. Difficult is that Amy is not sure how many miles she will drive over next three years. Create payoff table for Amy's decision.

  Write an iterative function power1 ,power2,power3

This problem considers several ways to compute xn for some n >= 0. (a) Write an iterative function power1 to compute xn for n >= 0.

  Design a shopping page with 5 products

Design a shopping page with 5 products on it. Each product has one image, product title, product description, and price.  You may add necessary buttons, page heading, and background.A. When the page first loaded, display exactly 5 product items with ..

  Demonstrate ability to integrate and apply information

demonstrate ability to integrate and apply information from various topics and to apply understanding and knowledge to a practical situation.

  Draw a magenta circle

Given a graphics object g, write a few lines of code to have that graphics object draw a magenta circle (not filled in) that has a diameter of 200 pixels.

  Frequent shopper program

Frequent Shopper Program

  Questions how and why of at&t problems

Introduction-Include a brief introduction into the company and it's problem or situation.

  Cost per server

cost per server

  Write a c program to draw an analog clock

Write a c program to draw an analog clock. Simulate the movement of needles.

  Determine whether a string is in the language l

Write a pseudocode function that uses a stack to determine whether a string is in the language L, where a. L= {w : w contains equal numbers of A's and B"s} b. L = {w : is of the form A(n) B(n) for some n >/= 0}

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd