Answer the following statements true (T) or false (F)
1. Modes of operation are the alternative techniques that have been
developed to increase the security of symmetric block encryption for large sequences of data.
2. The advantage of a stream cipher is that you can reuse keys.
3. A message authentication code is a small block of data generated by a secret key and appended to a message.
4. Like the MAC, a hash function also takes a secret key as input.
5. The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.
1. True
2. False
3. True
4. False
5. True
You might also like to view...
How many times will the following code print out the message?
``` for x in range (0 ,3): for y in range (1 ,5): print "I will be good" ```
The ________ function determines the largest value in a range of cells
Fill in the blank(s) with correct word
You can close Access by clicking the Close button on the ____.
A. status bar B. toolbar C. scroll bar D. title bar
You can use a(n) _______ to scramble and unscramble the data being transmitted between wireless devices.
A. wireless network key B. digital key C. firewall D. biometric device