Answer the following statements true (T) or false (F)
1. The way to measure the resistance of a hash algorithm to cryptanalysis is to compare its strength to the effort required for a brute-force attack.
2. It can be shown that some form of birthday attack will succeed against any hash scheme involving the use of cipher block chaining without a secret key, provided that either the resulting hash code is small enough or that a larger hash code can be decomposed into independent subcodes.
3. The most widely used hash function has been the Whirlpool.
4. Big-endian format is the most significant byte of a word in the low-address byte position.
5. The SHA-512 algorithm has the property that every bit of the hash code is a function of every bit of the input.
1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. TRUE
You might also like to view...
PPTP is commonly used when older clients need to connect to a network through a VPN or when a tunnel must pass through a firewall that performs NAT.
Answer the following statement true (T) or false (F)
What are some of the steps for conducting a forensic analysis of virtual machines?
What will be an ideal response?
What is TCO? Explain the importance of an accurate forecast with regards toTCO.
What will be an ideal response?
Many e-mail users prefer to reply to a message without including the original e-mail address along with their response.
Answer the following statement true (T) or false (F)