reaganmichael51
reaganmichael51 reaganmichael51
  • 20-11-2020
  • Computers and Technology
contestada

Hackers crack hash functions by finding collisions or pre-generating millions of hashes and comparing them until find the one generated it.

A. True
B. False

Respuesta :

Faithaghoorees
Faithaghoorees Faithaghoorees
  • 20-11-2020

Answer:

A. True

Explanation:

Most of the attacks on hash functions are based on finding collisions (so 2 different plain texts will match the same hash) or pre-generating millions of hashes and comparing them until you find the plain that generated it.

If a hash algorithm is reverse-engineerable or can be attacked that way, it's not a good hash algorithm.

Answer Link

Otras preguntas

Blockage of the _____ can reduce blood supply to the brain, causing a stroke
Given a +b=7 and a-b=3, find: 3^a/3^b
what is the area of this figure​
I need help please please I appreciate it! ):
A simple pendulum makes 540 complete oscillations in a minute, so its frequency is ........... HZ A-3 B-6 C-9 D-12
Describe the PCR technique; include details about the components required in a PCR reaction and the stages of each cycle. Make sure to mention the name of the e
find the vertex of y=-5x^2+10x+3
Explica con tus palabras cuál es la importancia o relevancia de la visita del papa a Irak. En tu explicación ten en cuenta la religiosidad de Irak , gobernantes
The points (6,y) and (7,9) fall on a line with a slope of 5. PLSSS HELPP Giving brainliest. what is the value of y?
Fourteen pounds less than eight times the pounds of chocolate Jo got for her birthday is three more than four times the pounds of chocolate Jo got. How much cho