Answer the following statements true (T) or false (F)

1. The straightforward use of public-key encryption provides confidentiality and authentication.
2. A CTR-based authenticated encryption approach is the most efficient mode of operation for high-speed packet networks.
3. An important characteristic of the MAC algorithm is that it needs to be reversible.
4. As with encryption algorithms and hash functions cryptanalytic attacks on MAC algorithms seek to exploit some property of the algorithm to perform some attack other than an exhaustive search.
5. To attack MD5, the attacker can choose any set of messages and work on these offline on a dedicated computing facility to find a collision.


1. FALSE
2. TRUE
3. FALSE
4. TRUE
5. TRUE

Computer Science & Information Technology

You might also like to view...

When there are many folders and subfolders involved, ____________________ pathnames can be cumbersome and confusing.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The contents of the CPU cache and registers get erased every time the computer gets turned off

Indicate whether the statement is true or false

Computer Science & Information Technology

The ____ is used to create and manage channels.

a. Pixel color channel b. Channels panel c. Color panel d. Layer Manager

Computer Science & Information Technology

Which of the following commands deletes an index?

A. DELETE INDEX B. REMOVE INDEX C. UNINDEX D. DROP INDEX

Computer Science & Information Technology