Answer the following statements true (T) or false (F)

1. The cryptographic hash function is not a versatile cryptographic algorithm.
2. It is possible to use a hash function but no encryption for message authentication.
3. Encryption hardware is optimized toward smaller data sizes.
4. Hash functions are commonly used to create a one-way password file.
5. A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.


1. FALSE
2. TRUE
3. FALSE
4. TRUE
5. FALSE

Computer Science & Information Technology

You might also like to view...

____ speech is not protected.

A. Political B. Dangerous C. Encyclopedic D. Derogatory

Computer Science & Information Technology

Which of the following is a reason security professionals can use a packet sniffer for?

a. To plan a DoS attack b. To capture user names and passwords c. To check if the encryption used is strong enough d. To capture sensitive documents

Computer Science & Information Technology

The ____ file is typically saved with a prefix of inc_.

A. insert B. include C. nested D. increment

Computer Science & Information Technology

In a posttest loop, the condition is evaluated before the instructions within the loop are processed.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology