Page 1 of 1

security.

Posted: Thu May 26, 2022 9:27 am
by answerhappygod
security.
Security 1
Security 1 (45.19 KiB) Viewed 33 times
3. The following figure shows a technique for authentication. What will happen if the hash function does not have a one-way property? What attack could be performed and how? S H M M compare || H(M||S) S || H In the figure M is a message, S is a shared secret, || represents concatenation and H is a hash function. 4. What are three benefits that can be provided by an intrusion detection system?