The compression function used in secure hash algorithms falls into one of two categories: a function specifically designed for the hash function or an algorithm based on a ___________ .
Fill in the blank(s) with the appropriate word(s).
symmetric block cipher
Computer Science & Information Technology
You might also like to view...
A ________ stores the layout and theme for the slides in a presentation
A) slide design B) slide master C) slide transition D) slide layout
Computer Science & Information Technology
To record the starting address of each of its files, a portion of the disk’s first track is set aside to hold a(n) __________.
a. directory b. index c. boot record d. table
Computer Science & Information Technology