Answer the following statements true (T) or false (F)

1. Unlike RSA, DSS cannot be used for encryption or key exchange.
2. The operations performed during a round consist of circular shifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA.
3. SHA-3 algorithms must be designed to resist any potentially successful attack on SHA-2 functions.
4. Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES.
5. A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key.


1. True
2. False
3. True
4. True
5. True

Computer Science & Information Technology

You might also like to view...

Aero ________ is a preview of any open window even when it is obscured by another window

Fill in the blank(s) with correct word

Computer Science & Information Technology

An Excel template is saved with the ________ extension

Fill in the blank(s) with correct word

Computer Science & Information Technology

While working with themes in a Microsoft Word 2016 document, the normal template can be customized and the changes can be saved byclicking the Set as Default button in the _____ group on the Design tab.?

A. ?Document Tracking B. ?Document Enhancing C. ?Document Formatting D. ?Document Indexing

Computer Science & Information Technology

The Priority Code Point field in a frame consists of how many bits?

A) 2 bits B) 3 bits C) 5 bits D) 8 bits

Computer Science & Information Technology