a. Finding values of T2
a= T1 + T2 = ae30c704 + 481486e1 = f6454de5
e = d + T1 = e51c2d60 + ae30c704 = 1934cf464
a
f6454de
5
1.
b
800808
1
c
0481800
3
d
5e6efc7
8
e
1934cf46
4
f
0010280
1
Answer for SHA-3:
A(0,0) = B(0,0) XOR (NOT B(1,0) AND B(2,0)
= 0 XO

Cybersecurity
Functional Wireframes
This is another type of wireframe that is used in building web applications. It
shows
not only how each page is structured but information about each widget,
button,
field, each piece of content, and what page is render

Cybersecurity
We compute 64 rounds (t = 0 63)
Whose result will be the hash for this block
And input to the next block of message
Then we would take another 512 bits of message until we have processed the
entire file and the output will be the hash for th

1.
a.
W[2]: 68 is a hex for h, 65 is a hex for e, 20 is a hex for space, and 57 is a
hex for w. And the W[2] row has the word he W, which explains the values in
w[2] row
W[8]: 6e is a hex for n, 74 is a hex for t, 2e is a hex for (.) period, 10 is a hex

a. Finding values of T2
a= T1 + T2 = ae30c704 + 481486e1 = f6454de5
e = d + T1 = e51c2d60 + ae30c704 = 1934cf464
a
f6454de
5
b
800808
1
c
0481800
3
d
5e6efc7
8
e
1934cf46
4
f
0010280
1
1. Answer for SHA-3:
A(0,0) = B(0,0) XOR (NOT B(1,0) AND B(2,0)
= 0 X

1.
a.
W[2]: 68 is a hex for h, 65 is a hex for e, 20 is a hex for space, and 57 is a
hex for w. And the W[2] row has the word he W, which explains the values in
w[2] row
W[8]: 6e is a hex for n, 74 is a hex for t, 2e is a hex for (.) period, 10 is a hex