subject

Create a cryptography program using polyalphabetic or polygraphic with hash-function to encrypt and decrypt the digest should be fixed length no matter the input use python or java?
examples
would you like to encrypt or decrypt choose one
1. encrypt
2. decrypt
would you like to continue y/n
if a user schoose yes should loop back else terminate program
input: abc \rightarrow hash functions \rightarrow output: zbc3 d3lf
input: cats and dogs \rightarrow hash functions \rightarrow output: ac6q ppsh
input: laptops \rightarrow hash functions \rightarrow output: 8rtg kxwm
it should have a fixed length digest or output .
show transcribed image text

ansver
Answers: 1

Other questions on the subject: Computers and Technology

image
Computers and Technology, 23.06.2019 09:00, jeremytheprimerapper
Which best compares appointments and events in outlook 2010appointments have a subject man, and events do notappointments have a specific date or range of dates, and events do notappointments have a start and end time of day, and events do notappointments have a location option, and events do not
Answers: 2
image
Computers and Technology, 23.06.2019 11:20, 1tzM3
Http is the protocol that governs communications between web servers and web clients (i. e. browsers). part of the protocol includes a status code returned by the server to tell the browser the status of its most recent page request. some of the codes and their meanings are listed below: 200, ok (fulfilled)403, forbidden404, not found500, server errorgiven an int variable status, write a switch statement that prints out the appropriate label from the above list based on status.
Answers: 2
image
Computers and Technology, 23.06.2019 14:00, allison9746
Need ! will choose brainliest! discuss the role of abstraction in the history of computer software.
Answers: 1
image
Computers and Technology, 23.06.2019 16:30, azainababbas
20 points archie wants to use a reflector as he photographs a newlywed couple. what would he consider in his choice? a. shadow and sunny b. homemade and professional c. lamps and boards d. incident and reflected e. neutral density and enhancement
Answers: 3
You know the right answer?
Create a cryptography program using polyalphabetic or polygraphic with hash-function to encrypt and...

Questions in other subjects:

Konu
Computers and Technology, 29.02.2020 02:20
Konu
Mathematics, 29.02.2020 02:21