subject

Suppose that alice and bob have access to two secure block ciphers, say, cipher a and cipher b, where cipher a uses a 64-bit key, whilecipher b uses a 128-bit key. alice prefers cipher a, while bob wants theadditional security provided by a 128-bit key, so he insists on cipher b. as a compromise, alice proposes that they use cipher a, but theyencrypt each message twice, using two independent 64-bit keys. assumethat no shortcut attack is available for either cipher. is alice's approachas secure as bob's?

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 16:00
Ramon is graphing the function  f(x) = 3(4)x. he begins by plotting the initial value. which graph represents his initial step?
Answers: 2
question
Computers and Technology, 22.06.2019 01:30
What kind of motivation is katrina showing? use the drop-down menu to complete the statement. katrina is using motivation because she is personally interested in learning more.
Answers: 2
question
Computers and Technology, 22.06.2019 11:30
Hassan is writing his master’s thesis, which is a thirty-page document. he received some feedback from his professor in the form of comments, but does not see where the comments are. what is the fastest way for hassan to find the feedback?
Answers: 3
question
Computers and Technology, 23.06.2019 01:50
Create a class named majors that includes an enumeration for the six majors offered by a college as follows: acc, chem, cis, eng, his, phys. display the enumeration values for the user, then prompt the user to enter a major. display the college division in which the major falls. acc and cis are in the business division, chem and phys are in the science division, and eng and his are in the humanities division. save the file as majors.java.
Answers: 2
You know the right answer?
Suppose that alice and bob have access to two secure block ciphers, say, cipher a and cipher b, wher...
Questions
question
Mathematics, 27.07.2019 08:00
Questions on the website: 13722361