Answer the following statements true (T) or false (F)

1. The cryptographic hash function is not a versatile cryptographic algorithm.
2. It is possible to use a hash function but no encryption for message authentication.
3. Encryption hardware is optimized toward smaller data sizes.
4. Hash functions are commonly used to create a one-way password file.
5. A weak hash function is sufficient to protect against an attack in which one party generates a message for another party to sign.

1. FALSE
2. TRUE
3. FALSE
4. TRUE
5. FALSE

Computer Science & Information Technology

You might also like to view...

A ________ consists of rows and columns of data or numbers

A) chart B) graph C) table D) cell

Computer Science & Information Technology

____ is a broadband wireless transmission technology that is based upon a series of IEEE standards.?

A. ?WiFi B. ?Bluetooth C. ?IrDA D. ?WiMAX

Computer Science & Information Technology