Which statement about cryptography is FALSE?

A. Asynchronous encryption occurs when encryption or decryption requests are processed from a queue.
B. Symmetric encryption is an encryption method whereby a single private key both encrypts and decrypts the data.
C. When using a digital signature, the message is used as an input to a hash function, and the sender's public key encrypts the hash value.
D. Key clustering occurs when different encryption keys generate the same ciphertext from the same plaintext message.

C

Explanation: When using a digital signature, the message is used as an input to a hash function, and the sender's PRIVATE, not public, key encrypts the hash value.

Computer Science & Information Technology

You might also like to view...

Suppose you suspect that your session with a server has been intercepted in a man-in-the middle attack. You have a key, K, that you think you share with the server, but you might be only sharing it with an attacker. But the server also has a public key, KP , which is widely known, and a private secret key, KS, that goes with it. Describe how you can either confirm you share K with the server or

discover that you share it only with a man-in-the-middle. Also, be sure your solution will not be discovered by a packet sniffer. What will be an ideal response?

Computer Science & Information Technology

The ACPI power management function offers many standby states that use different resources while in idle. Which standby state should be used most often to conserve power?

a. S1/POS. b. S2/CPU is powered off. c. S3/STR. d. S4/STD.

Computer Science & Information Technology