The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).

A. HMAC B. XOR

C. RSA D. SHA-1


D. SHA-1

Computer Science & Information Technology

You might also like to view...

To open a file for read-write and random access requires

a. The usual definition of an ofstream or ifstream object. b. A call to open ofstream or ifstream object, but there must be a second argument to the open function. c. The stream to be defined using the class fstream. defined in the header file. d. The stream to be connected to the physical file object with first argument a C-string containing the physical file name and a second argument, ios::in | ios::out that specifies that the i/o with the file should be for either reading or writing. e. #include, using std::fstream; and using std::ios;

Computer Science & Information Technology

Which logical unit of the computer sends information that has already been processed by the computer to various devices so that the information may be used outside the computer? _______ .

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The purpose of SETA is to enhance security in all but which of the following ways?

A. by building in-depth knowledge B. by adding barriers C. by developing skills D. by improving awareness

Computer Science & Information Technology

In a linked list, each element contains two parts: data and a description of the data.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology