Answer the following statements true (T) or false (F)
1. The cryptographic hash function is not a versatile cryptographic algorithm.
2. It is possible to use a hash function but no encryption for message authentication.
3. Encryption hardware is optimized toward smaller data sizes.
4. Hash functions are commonly used to create a one-way password file.
5. A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.
1. FALSE
2. TRUE
3. FALSE
4. TRUE
5. FALSE
Computer Science & Information Technology
You might also like to view...
A ________ consists of rows and columns of data or numbers
A) chart B) graph C) table D) cell
Computer Science & Information Technology
____ is a broadband wireless transmission technology that is based upon a series of IEEE standards.?
A. ?WiFi B. ?Bluetooth C. ?IrDA D. ?WiMAX
Computer Science & Information Technology