In 5 and 6, trace the action of the binary search algorithm (Algorithm 11.5.1) on the variables index, bot, top, mid, and the given values of x for the input array a[1] = Chia, a[2] = Doug, a[3] = Jan, a[4] = Jim, a[5] = José, a[6] = Mary, a[7] = Rob, a[8] = Roy, a[9] = Sue, a[10] = Usha, where alphabetical ordering is used to compare elements of the array.a. x = Chiab. x = Max

Leslie Ogu CSCI 4531 09/20/2016 - Chapter 21: Public-Key Encryption and Message Authentication Secure Hash Algorithm ● SHA was originally developed by NIST ● Published as FIPS 180 in 1993 ● Was revised in 1995 as SHA-1 ○ Produces 160-bit hash values ● NIST issued revised FIPS 180-2 in 2002 ○ Adds 3 additional versions of SHA ○ SHA-256,...