Function of cryptographic hashing

Assignment Help Basic Computer Science
Reference no: EM13829359

Problem:

1. Which of the following is NOT a function of cryptographic hashing:

a. To provide the input to a signature algorithm
b. To provide "shadow files" for critical security data such as passwords
c. To compress data for efficient transmission
d. To cryptographically bind parameters in a security protocol

2. A masquerade attack on a network involves:

a. Discovering the pattern of traffic between two or more users
b. Changing the contents of a message and sending it to an unsuspecting user
c. Releasing the content of a message to users not holding the corresponding key
d. Sending messages from fraudulent source

Additional Information:

These multiple choice questions is from Computer Science. The 1st question is about function of cryptographic hashing. The 2nd question is about what involves in a masquerade attack on a network.

Reference no: EM13829359

Questions Cloud

Public key cryptography : The format of an X.509 certificate is described in
Purpose of trade union in unitarism theory : Perspective of unitarism. the organization is regarded as an integrated and harmonious group of people with one loyalty culture. In addition, this perspective similar to paternalism has a high requirement for the loyalty of all employees.
Authenticator-data compression-encryption : 1. An authenticator is:
Calculate the rate for the new bond issue : Debt: The firm can sell a 20-year, semi-annual,$1,000 par value, 9 percent bond for $980. A flotation cost of 2 percent of the face value would be required in addition to the discount of $20. Preferred Stock: The firm has determined it can issue pref..
Function of cryptographic hashing : Which of the following is NOT a function of cryptographic hashing:
Security protocol-complexity of differential cryptanalysis : In a security protocol, which of the following tends to make the best nonce?
Determining the decryption exponent for rsa key : Let the public key associated with an RSA key be (3,15) where e = 3 is the encryption exponent, and n = 15 is the modulus. The corresponding decryption exponent d is then
What pricing strategies should be employed : Examine what demographics and coinciding pricing structure should JCPenney be focused on in order to increase sales after a decline from a recent change in strategies
History and implementation of object oriented databases : Write a 3-4 page paper that describes any one of the topics in detail. Include a discussion on the following subject areas and include any graphs.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Work breakdown structure

A written paper and a Work Breakdown Structure (WBS). You must submit the two (2) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for

  Compare tcp and udp protocols

)You suspect that the failure of a router or of a transmission line connecting routers has left some of your important servers unavailable to clients at your site. How could you narrow down the location of the problem?

  When would a weak relationship be more suitable

When would a weak relationship be more suitable than a strong relationship? Give concrete examples?

  A business can use twitter to gain business intelligence

A business can use Twitter to gain business intelligence? How many companies do you think are aware of Twitter and exactly how they can use it to gain BI? How do  you think Twitter uses a data warehouse? How do you think companies store Twitter infor..

  Designing a 24 cpu multiprocessor chip

designing a 24 CPU multiprocessor chip to compete with Intel PHI at a lower price point. Each core will run at 2 GHz and have a 32Kb L1 cache, 50ps access (per word), 8 word blocks, 4-way associative, write-through, 1% miss ratio There is a 6Mb L2 ca..

  Compare the memory management systems of windows

Compare the memory management systems of Windows (recent versions, after Win 2000) and Linux from the pagination/segmentation point of view.

  What is the maximum i/o wait that can be tolerated

What is the maximum I/O wait that can be tolerated?

  Risk assessment section

Risk Assessment Section

  You were recently hired by a company which is spread over

you were recently hired by a company that is spread over several buildings along several city blocks and uses a man

  Consider the three binary relations on the set of integers

consider the three binary relations on the set of integers z defined by a less than or equal to b ab if and only if ab

  Draw an erd to model this situation

The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on each team and the children that will be playing on each team and their parents.

  The contenders are tortoise and hare

The contenders are Tortoise and Hare, and they begin race as investors at "tile 1" of 70 tiles The finish line is at 70 the tile. With each tick of the clock

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd