Computers and Technology, 26.03.2020 21:57 Kookiexperfect9420
SHA-1 gives 160-bit secure hash. Let's assume that a successful brute force attack is possible by trying 2^(160/3) combinations. If we do a double hash (as is done in Encase tool for forensics), the input is the secure hash of the message and the output is also another secure hash. Comparing this with SHA-2 using 256 bits, we can say:
A) SHA-256 is stronger because it requires 2^(256/3) brute force combinations, while SHA-1 still needs 2^(160/3) combinations.
B) double SHA-1 is stronger because it requires twice the 2^(160/3) combinations.
C) double SHA-1 is stronger because it requires about 2^(160/3) X 2^(160/3) maximum combinations because for each broken first stage, there are 2^(160/3) brute force attempts may be needed.
D) they are roughly equal and there was no need for the 256 version.
Answers: 3
Computers and Technology, 22.06.2019 18:30
Which of the following is an example of intellectual properly! oa. new version of a novelb. journal of ideasc. pages of a bookood. lines of a poem
Answers: 2
Computers and Technology, 23.06.2019 20:50
3.11.3 quiz: comparing and analyzing function typesquestion 4 of 102 pointswhat can you say about the y-values of the two functions f(x) = 3x2-3 andg(x)=2* - 3?
Answers: 2
Computers and Technology, 24.06.2019 10:10
Which view in a presentation program displays a split window showing the slide in the upper half and a blank space in the lower half?
Answers: 1
Computers and Technology, 24.06.2019 23:30
Game design colleges anyone know the requirements? ?
Answers: 1
SHA-1 gives 160-bit secure hash. Let's assume that a successful brute force attack is possible by tr...
Computers and Technology, 28.11.2019 02:31