Answer the following statements true (T) or false (F)

1. Given the potential vulnerability of DES to a brute-force attack, an alternative has been found.
2. A number of Internet based applications have adopted two-key 3DES, including PGP and S/MIME.
3. The sender is the only one who needs to know an initialization vector.
4. A typical application of Output Feedback mode is stream oriented transmission over noisy channel, such as satellite communication.
5. Cipher Feedback (CFB) is used for the secure transmission of single values.

1. TRUE
2. FALSE
3. FALSE
4. TRUE
5. FALSE

Computer Science & Information Technology

You might also like to view...

Which statement below about prototypes and headers is true?

A. Parameter names must be listed in the prototype, but not necessarily in the header. B. Prototypes end with a semicolon, but headers do not. C. Headers should come before prototypes. D. Headers end with a semicolon, but prototypes do not.

Computer Science & Information Technology

Every table in a database must contain one field that is designated as the ID key field. __________________________

Answer the following statement true (T) or false (F)

Computer Science & Information Technology