subject

Secure Hash algorithms, such as SHA-1, send encrypted Hash. This Hash can be used to confirm that the data was not tampered with or to confirm the identity of the sender (such as in Digital Signatures). In order to use this Hash as a Digital Signature a. the encryption key used must be generated at both ends of communications independently without transmitting it ever. b. the encryption key must be the private key of the sender. c. only the sender and the receiver should know the encryption key. d. only the administrator should know the encryption key.

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 06:30
Exchanging which type of data uses the least bandwidth? music photographs video voice bandwidth- the amount of data that can be moved between two points in a set time period
Answers: 1
question
Computers and Technology, 22.06.2019 09:00
Create a cell reference in a formula by typing in the cell name or         a. right-clicking the cell. b. clicking the cell. c. clicking the column where the cell is located. d. clicking the row where the cell is located.
Answers: 1
question
Computers and Technology, 22.06.2019 11:00
The isometric projection camera technique provides an illusion of perspective by using things like parallax scrolling to create the illusion of 3d in a 2d game
Answers: 3
question
Computers and Technology, 22.06.2019 19:20
Amedian in the road will be marked with a white sign that has a black arrow going to the left of the median. true false
Answers: 1
You know the right answer?
Secure Hash algorithms, such as SHA-1, send encrypted Hash. This Hash can be used to confirm that th...
Questions
question
Mathematics, 29.10.2020 17:30
question
History, 29.10.2020 17:30
question
English, 29.10.2020 17:30
question
Mathematics, 29.10.2020 17:30
question
Chemistry, 29.10.2020 17:30
question
English, 29.10.2020 17:30
Questions on the website: 13722360