Computers and Technology

2. After your explanation in part 1), Barney agrees to use SHA-2 for hashing. However, to save space he proposes to only use the first 128 bits to create a 128 bit hash. He argues that since 128 bit encryption keys are secure, a 128 bit hash should also be secure. Explain what kind of attack a 128 bit hash would be vulnerable to, and why.

answer
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 14:00, camiserjai1832
In which job role will you be creating e-papers, newsletters and preiodicals
Answers: 1
image
Computers and Technology, 24.06.2019 00:30, rustjallison9928
Asecurity policy is a a. set of guidlines b. set of transmission protocols c. written document d. set of rules based on standards and guidelines
Answers: 2
image
Computers and Technology, 24.06.2019 04:30, NEUROPHARMACOLOGICAL
The ieee 802.11: defines standards for wireless local area network (wlan) communication protocols. identifies various computers or devices connected to a network. verifies any resource attached to another computer on a network that is different from the computer to which the user is logged on. connects multiple local area networks (lans) and wide area networks (wans).
Answers: 2
image
Computers and Technology, 24.06.2019 09:00, king514
Technician a says that a new replacement part is always good. technician b says that sometimes recent repair work will be the cause of a complaint. who is correct? a. both technicians a and b b. technician a c. technician b d. neither technician a nor b
Answers: 3
Do you know the correct answer?
2. After your explanation in part 1), Barney agrees to use SHA-2 for hashing. However, to save space...

Questions in other subjects:

Konu
Mathematics, 24.09.2019 07:00
Konu
Mathematics, 24.09.2019 07:00
Konu
Biology, 24.09.2019 07:00
Konu
History, 24.09.2019 07:00