edited by
5,018 views

1 Answer

Best answer
3 votes
3 votes

All 4 are Application of Hash Function

Construct a message authentication code  ,Digital signature   ,Timestamping  , Key updating

 

selected by

Related questions

0 votes
0 votes
1 answer
1
tishhaagrawal asked Dec 16, 2023
360 views
Below is my approach to solving this question, can anyone please explain if I am doing it the right way?Let X = #free slotssince, m =7 and n = 3So, $4 \leqslant x\leqsla...
0 votes
0 votes
0 answers
3
Na462 asked Sep 15, 2018
756 views
Which of following is true ?A. A secure hash function can never produce any collisions.B. Cryptographic function is deterministicC. Host using DHCP on wired network can b...
0 votes
0 votes
1 answer
4
dragonball asked Aug 4, 2018
13,946 views
Which of the following is the least suitable hash function H(x) where X is some non negative integer ?1. h(k) =k%n2.h(k) =k*k %n3.h(k)=(gcd(k+1,2k+2) +k ) %nLinear probin...