Research the Internet for various hash Algorithms such as Message Digest etc. and report your finding in a
table to show the information on size, security, key length and your comments.
Consider that we have two computers wishing to communicate with each other and need to exchange a secret
key. For example, you could be buying a textbook from Amazon and want to be sure that your credit card and
other information is secretly sent to amazon. So, we need the following information:
Assume you are A and Amazon is B.
A and B choose the following number
Base Number 16
Prime Number 541
A chooses 7 as its secret number
B chooses 12 as its secret number
The post Network Security appeared first on ACED ESSAYS.