Internet Security

  1. Given a message m, denote by H(m) the hash of the message m.
    a) Can we use Java library .hashCode() method to generate H(m)? Why or why not?
    b) Suppose that the sender and receiver shares a secret s and that the sender sends (m, H(s|m)), where(s|m) means adding s at the beginning of m. Is this algorithm flawed? Why or why or?

This question has been answered.

Get Answer