Answer the following statements true (T) or false (F)

1. A brute-force attack on a MAC is easier than a brute-force attack on a hash function.
2. Message authentication may also verify sequencing and timeliness.
3. The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.
4. Message encryption by itself cannot provide a measure of authentication.
5. If the calculated frame check sequence is equal to the incoming frame check sequence the message is considered authentic.


1. FALSE
2. TRUE
3. TRUE
4. FALSE
5. TRUE

Computer Science & Information Technology

You might also like to view...

Which of the following functions should be used to determine how far the sample data is spread around the mean?

What will be an ideal response?

Computer Science & Information Technology

The most common HD format is 1080p, which uses a screen resolution of 1,920 ? 1,080 and displays screen images one line at a time, called ____.

A. progressive display B. interlaced display C. layer display D. laser display

Computer Science & Information Technology

Effective software project management focuses onA) payoffB) peopleC) performanceD) processE) productF) project

What will be an ideal response?

Computer Science & Information Technology

Rather than simply deleting a node in the middle of the tree, we try to maintain the existing structure as much as possible by _____.

A. rebalancing the tree afterwards B. finding data to take the place of the deleted data C. leaving the node with an empty marker until a new insertion can fill the space D. filling the node with the data in its left child

Computer Science & Information Technology