Answer the following statements true (T) or false (F)
1. A digital signature can guarantee the integrity but not the source of the message.
2. It must be computationally infeasible to forge a digital signature, either by constructing a new message for an existing digital signature or by constructing a fraudulent digital signature for a given message.
3. The global public key components for DSA are p, q, and h.
4. The most important development from the work on public-key cryptography is the digital signature.
5. The ElGamal signature scheme involves the use of the public key for encryption and the private key for decryption.
1. FALSE
2. TRUE
3. FALSE
4. TRUE
5. FALSE
You might also like to view...
Intermediate Stream operation ________ results in a stream with the specified number of elements from the beginning of the original stream.
a. distinct b. map c. filter d. limit
Sampling rate is important when creating an analog signal from a digital source
Indicate whether the statement is true or false
Answer the following statement(s) true (T) or false (F)
Network forensics is a fast, easy process.
An exploit discovered for one OS might also be effective on another OS.
a. true b. false