Answer the following statements true (T) or false (F)

1. Given the potential vulnerability of DES to a brute-force attack, an alternative has been found.
2. A number of Internet based applications have adopted two-key 3DES, including PGP and S/MIME.
3. The sender is the only one who needs to know an initialization vector.
4. A typical application of Output Feedback mode is stream oriented transmission over noisy channel, such as satellite communication.
5. Cipher Feedback (CFB) is used for the secure transmission of single values.


1. TRUE
2. FALSE
3. FALSE
4. TRUE
5. FALSE

Computer Science & Information Technology

You might also like to view...

In most cases, it is advisable to enforce referential integrity in databases with related tables

Indicate whether the statement is true or false

Computer Science & Information Technology

Which function is best suited to return the specified number of characters from the end of a text string?

A) LEFT B) RIGHT C) MID D) TRIM

Computer Science & Information Technology

What does it mean if a fiber-optic cable is designated as 62.5/125 µm?

What will be an ideal response?

Computer Science & Information Technology

A DOCTYPE declaration like the one in the accompanying figure is also known as a(n) _____.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology