What three conditions must be true to make a hashing algorithm secure?
What will be an ideal response?
1. No hash should be usable to determine the original input. 2. No hashing algorithm should
be run on the same input and produce different hashes. 3. A hashing algorithm should not be
run on two different inputs and produce the same hash (collision).
Computer Science & Information Technology
You might also like to view...
To change to the completed application’s directory, we opened a command window and used the ________ command to change to the directory (also called a folder) for the Painter application.
a. chge b. cdir c. cd d. changeDirectory
Computer Science & Information Technology
What is the value of x after the following statements execute?int x = 5;int y = 30;do x = x * 2;while (x < y);
A. 5 B. 10 C. 20 D. 40
Computer Science & Information Technology