Answer the following statements true (T) or false (F)

1) In a public-key algorithm, one key is used for both encryption and decryption.
2) Digital certificates are intended to be used indefinitely.
3) Secure Sockets Layer protects data stored on a merchant’s server.
4) Digital signatures can provide undeniable proof of the author of a document.
5) In a network of 10 users communicating using public-key cryptography, only 10 keys are needed in total.

1) F
2) F
3) F
4) F
5) F

Computer Science & Information Technology

You might also like to view...

What is the primary difference between network policy conditions and network policy constraints?

What will be an ideal response?

Computer Science & Information Technology

In the weighted point evaluation method, the product that is usually selected is the one with ____.

A. the lowest overall score B. the highest overall score C. the score closest to the benchmark D. the score with the lowest cost

Computer Science & Information Technology