Which one of the following is not a characteristic of a hashing algorithm?

A. It is computationally infeasible to construct two different messages with the same digest
B. It converts a message of arbitrary length into a message digest of a fixed length
C. It converts a message of a fixed length into a message digest of arbitrary length.
D. Given a digest value, it is computationally infeasible to find the corresponding message


C. It converts a message of a fixed length into a message digest of arbitrary length.

Computer Science & Information Technology

You might also like to view...

Discuss the issue of how the scope of an event system can and should be related to the physical extent of a smart space in which it is used.

What will be an ideal response?

Computer Science & Information Technology

The __________ statement executes its body at least once and continues executing until its loop-termination condition becomes false.

a) while b) if c) do…while d) if…else

Computer Science & Information Technology

What statement regarding passwords on Windows is accurate?

A. it's best to write your password down so you don't get locked out of your computer B. passwords cannot be longer than 14 characters C. by default, accounts with a blank password cannot logon remotely D. letters and numbers are allowed, but no symbols such as ‘@' or ‘!'

Computer Science & Information Technology

In a search, by default Windows Vista uses a technique known as ________ ,which matches to a part of a word or phrase rather than to whole words

Fill in the blank(s) with correct word

Computer Science & Information Technology