subject

This problem introduces a hash function similar in spirit to SHA that operates on letters instead of binary data. It is called the toy tetragraph hash (tth).9 Given a message consisting of a sequence of letters, tth produces a hash value consisting of four letters. First, tth divides the message into blocks of 16 letters, ignoring spaces, punctuation, and capitalization. If the message length is not divisible by 16, it is padded out with nulls. A four-number running total is maintained that starts out with the value (0, 0, 0, 0); this is input to a function, known as a com- pression function, for processing the first block. The compression function consists of two rounds. Round 1: Get the next block of text and arrange it as a row-wise 4 * 4 block of text and covert it to numbers (A = 0, B = 1, example, for the block ABCDEFGHIJKLMNOP, we have A B C D E F G H I J K L M N O P 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Then, add each column mod 26 and add the result to the running total, mod 26. In this example, the running total is (24, 2, 6, 10). Round 2: Using the matrix from round 1, rotate the first row left by 1, second row left by 2, third row left by 3, and reverse the order of the fourth row. In our example, B C D A G H E F L I J K P O N M 1 2 3 0 6 7 4 5 11 8 9 10 15 14 13 12 Now, add each column mod 26 and add the result to the running total. The new run- ning total is (5, 7, 9, 11). This running total is now the input into the first round of the compression function for the next block of text.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 17:00
Annie is creating a corporate report for a company’s annual meeting. in the report, she wants to add the signature of various department heads. which device can annie use to capture signatures to include in the report? a. printer b. monitor c. e-reader d. digitizing tablet
Answers: 1
question
Computers and Technology, 22.06.2019 20:40
Assume that there is a 4% rate of disk drive failure in a year. a. if all your computer data is stored on a hard disk drive with a copy stored on a second hard disk drive, what is the probability that during a year, you can avoid catastrophe with at least one working drive? b. if copies of all your computer data are stored on three independent hard disk drives, what is the probability that during a year, you can avoid catastrophe with at least one working drive?
Answers: 1
question
Computers and Technology, 23.06.2019 07:10
If you want to import a picture into a dtp application, what must you do first? draw an image frame. import text. open the folder containing the file. select get image… from the windows menu.
Answers: 2
question
Computers and Technology, 25.06.2019 08:00
Which of the following statements is true of an intranet? it is a network where a computer is connected to the internet and acts as a gateway for other devices.it is a widely available public network of interconnected computer networks.it is a network that covers a wide area with the of rented telecommunication lines.it is a network within an organization that uses internet protocols and technologies.
Answers: 3
You know the right answer?
This problem introduces a hash function similar in spirit to SHA that operates on letters instead of...
Questions
question
SAT, 21.05.2021 18:50
question
Mathematics, 21.05.2021 18:50
question
Mathematics, 21.05.2021 18:50
question
Mathematics, 21.05.2021 18:50
question
Mathematics, 21.05.2021 18:50