The compression function used in secure hash algorithms falls into one of two categories: a function specifically designed for the hash function or an algorithm based on a ___________ .

Fill in the blank(s) with the appropriate word(s).

symmetric block cipher

Computer Science & Information Technology

You might also like to view...

A ________ stores the layout and theme for the slides in a presentation

A) slide design B) slide master C) slide transition D) slide layout

Computer Science & Information Technology

To record the starting address of each of its files, a portion of the disk’s first track is set aside to hold a(n) __________.

a. directory b. index c. boot record d. table

Computer Science & Information Technology