Computers and Technology
Computers and Technology, 04.07.2019 21:20, becky1301

Create a cryptography program using polyalphabetic or polygraphic with hash-function to encrypt and decrypt the digest should be fixed length no matter the input use python or java?
examples
would you like to encrypt or decrypt choose one
1. encrypt
2. decrypt
would you like to continue y/n
if a user schoose yes should loop back else terminate program
input: abc \rightarrow hash functions \rightarrow output: zbc3 d3lf
input: cats and dogs \rightarrow hash functions \rightarrow output: ac6q ppsh
input: laptops \rightarrow hash functions \rightarrow output: 8rtg kxwm
it should have a fixed length digest or output .
show transcribed image text

answer
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 09:30, eiza666
My mom and i are moving and we don’t have wifi for the next week, i want to know if using a using a hotspot with unlimited data is better than using regular wifi. i’m considering cost, speed, and data sacrifices.
Answers: 1
image
Computers and Technology, 22.06.2019 21:00, jarrettashlyn
Write a method so that the main() code below can be replaced by the simpler code that calls method original main(): public class calcmiles { public static void main(string [] args) { double milesperhour; double minutestraveled; double hourstraveled; double milestraveled; milesprhour = scnr. nextdouble(); minutestraveled = scnr. nextdouble(); hourstraveled = minutestraveled / 60.0; milestraveled = hourstraveled * milesperhour; system. out. println("miles: " + milestraveled); } }
Answers: 2
image
Computers and Technology, 23.06.2019 09:30, gabby640
Name the range function that would generate the following list of integers values: 0,1,2,3,4,5.
Answers: 1
image
Computers and Technology, 24.06.2019 09:10, daedae11142
  to change the number of rows and columns displayed by the excel object a. select the object and drag a size handle on the active object. b. deselect the object and drag a size handle of the object. c. deselect the object and drag a row or column divider of the object. d. select the object and drag a row or column divider on the active object.
Answers: 2
Do you know the correct answer?
Create a cryptography program using polyalphabetic or polygraphic with hash-function to encrypt and...

Questions in other subjects: