Answer the following statements true (T) or false (F)

1. The appeal of HMAC is that its designers have been able to prove an exact relationship between the strength of the embedded hash function and the strength of HMAC.
2. RSA is a block cipher in which the plaintext and ciphertext are integers between 0 and n – 1 for some n.
3. Timing attacks are only applicable to RSA.
4. The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithms.
5. The key exchange protocol is vulnerable to a man-in-the-middle attack because it does not authenticate the participants.


1. T
2. T
3. F
4. T
5. T

Computer Science & Information Technology

You might also like to view...

An Entrance effect ________

A) spirals an object off the slide B) occurs as the text exits the slide C) emphasizes text that is displayed D) brings a slide element onto the screen

Computer Science & Information Technology

It is a common practice to begin a procedure's name with a(n) ____.

A. noun B. verb C. adjective D. adverb

Computer Science & Information Technology