Answer the following statements true (T) or false (F)
1. Given the potential vulnerability of DES to a brute-force attack, an alternative has been found.
2. A number of Internet based applications have adopted two-key 3DES, including PGP and S/MIME.
3. The sender is the only one who needs to know an initialization vector.
4. A typical application of Output Feedback mode is stream oriented transmission over noisy channel, such as satellite communication.
5. Cipher Feedback (CFB) is used for the secure transmission of single values.
1. TRUE
2. FALSE
3. FALSE
4. TRUE
5. FALSE
You might also like to view...
In most cases, it is advisable to enforce referential integrity in databases with related tables
Indicate whether the statement is true or false
Which function is best suited to return the specified number of characters from the end of a text string?
A) LEFT B) RIGHT C) MID D) TRIM
What does it mean if a fiber-optic cable is designated as 62.5/125 µm?
What will be an ideal response?
A DOCTYPE declaration like the one in the accompanying figure is also known as a(n) _____.
Fill in the blank(s) with the appropriate word(s).