Answer the following statements true (T) or false (F)

1. The way to measure the resistance of a hash algorithm to cryptanalysis is to compare its strength to the effort required for a brute-force attack.
2. It can be shown that some form of birthday attack will succeed against any hash scheme involving the use of cipher block chaining without a secret key, provided that either the resulting hash code is small enough or that a larger hash code can be decomposed into independent subcodes.
3. The most widely used hash function has been the Whirlpool.
4. Big-endian format is the most significant byte of a word in the low-address byte position.
5. The SHA-512 algorithm has the property that every bit of the hash code is a function of every bit of the input.


1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. TRUE

Computer Science & Information Technology

You might also like to view...

PPTP is commonly used when older clients need to connect to a network through a VPN or when a tunnel must pass through a firewall that performs NAT.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What are some of the steps for conducting a forensic analysis of virtual machines?

What will be an ideal response?

Computer Science & Information Technology

What is TCO? Explain the importance of an accurate forecast with regards toTCO.

What will be an ideal response?

Computer Science & Information Technology

Many e-mail users prefer to reply to a message without including the original e-mail address along with their response.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology