--%>

What is hash function

Explain the term hash function?

E

Expert

Verified

Hash function accepts the variable size message M as the input and generates the fixed size hash code H (M) known as the message digest as output. It refers to the variation upon message authentication code.

   Related Questions in Computer Network Security

  • Q : Wireless Information Security System

    Wireless Information Security System: In any wireless network only secure authorized usage should be given and the company should make sure o putting the best practices into use. The access points should not be given access without putting it through

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Cloud computingb security syntheses +20

    syntheses +20 paper +5 figures starting from introduction until conclusion

  • Q : End-to-end encryption and link State

    State the difference between end-to-end encryption and link?

  • Q : Define Wifi Broadband What do you mean

    What do you mean by the term Wifi Broadband?

  • Q : What is triple encryption Explain the

    Explain the term triple encryption?

  • Q : Techniques for distribution of public

    plain the techniques that are used for the distribution of public key.

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : Block cipher modes Explain why some

    Explain why some block cipher modes of the operation use encryption whereas the others use both the encryption and the decryption?

  • Q : Address allocation and flow mapping

    Any questions that are completed should be explained and given a general reason to why that strategy was used. Address allocation is already done and flow mapping is already completed. I just need Q2, Q4, Q5, Q6, Q7, Q8, Q9 answered.