Invitation to Computer Science 8th Edition

Published by Cengage Learning
ISBN 10: 1337561916
ISBN 13: 978-1-33756-191-4

Chapter 8 - 8.2 - Threats and Defenses - Practice Problems - Page 401: 1

Answer

to verify that the password $\textbf {“chjbup5”}$ also hashes to “gb” we do the following: \begin{array}{ll}{\text { Step } 1 :} & {\textbf {chjbup5 } \rightarrow 3\ 8\ 10\ 2\ 21\ 16\ 5} \\ {\text { Step } 2 :} & {3+8+10+2+21+16+5=65} \\ {\text { Step } 3 :} & {65 / 7 \text { leaves a remainder of } 2(65=9 \times 7 \text { with } 2 \text { left over) }} \\ {\text { Steps } 4 \text { and } 5 : } & { \text {are identical to the example. } } \end{array}

Work Step by Step

to verify that the password $\textbf {“chjbup5”}$ also hashes to “gb” we do the following: \begin{array}{ll}{\text { Step } 1 :} & {\textbf {chjbup5 } \rightarrow 3\ 8\ 10\ 2\ 21\ 16\ 5} \\ {\text { Step } 2 :} & {3+8+10+2+21+16+5=65} \\ {\text { Step } 3 :} & {65 / 7 \text { leaves a remainder of } 2(65=9 \times 7 \text { with } 2 \text { left over) }} \\ {\text { Steps } 4 \text { and } 5 : } & { \text {are identical to the example. } } \end{array}
Update this answer!

You can help us out by revising, improving and updating this answer.

Update this answer

After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.