Answer the following statements true (T) or false (F)
1. Unlike RSA, DSS cannot be used for encryption or key exchange.
2. The operations performed during a round consist of circular shifts, and primitive Boolean functions based on DSS, MD5, SHA, and RSA.
3. SHA-3 algorithms must be designed to resist any potentially successful attack on SHA-2 functions.
4. Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES.
5. A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key.
1. True
2. False
3. True
4. True
5. True
You might also like to view...
Aero ________ is a preview of any open window even when it is obscured by another window
Fill in the blank(s) with correct word
An Excel template is saved with the ________ extension
Fill in the blank(s) with correct word
While working with themes in a Microsoft Word 2016 document, the normal template can be customized and the changes can be saved byclicking the Set as Default button in the _____ group on the Design tab.?
A. ?Document Tracking B. ?Document Enhancing C. ?Document Formatting D. ?Document Indexing
The Priority Code Point field in a frame consists of how many bits?
A) 2 bits B) 3 bits C) 5 bits D) 8 bits