Invitation to Computer Science 8th Edition

Published by Cengage Learning
ISBN 10: 1337561916
ISBN 13: 978-1-33756-191-4

Chapter 8 - 8.2 - Threats and Defenses - Practice Problems - Page 401: 3

Answer

No; from Problem $2,$ the encrypted form of Judy's password "judy" is ed, but "mike" hashes to $f c .$ The encrypted versions do not match.

Work Step by Step

No; from Problem $2,$ the encrypted form of Judy's password "judy" is ed, but "mike" hashes to $f c .$ The encrypted versions do not match.
Update this answer!

You can help us out by revising, improving and updating this answer.

Update this answer

After you claim an answer you’ll have 24 hours to send in a draft. An editor will review the submission and either publish your submission or provide feedback.