Answer the following statements true (T) or false (F)

1. It is important in a direct digital signature to perform an outer confidentiality function first and then the signature function.
2. Message authentication protects two parties who exchange messages from any third party, however, it does not protect the two parties against each other.
3. The digital signature function does not include the authentication function.
4. The DSS approach makes use of a hash function.
5. It must be relatively difficult to recognize and verify the digital signature.

1. FALSE
2. TRUE
3. FALSE
4. TRUE
5. FALSE

Computer Science & Information Technology

You might also like to view...

How is the code for an index entry field formatted?

A) grayed out B) italic C) hidden D) bold

Computer Science & Information Technology

When a field has no value—a value that is unknown or unavailable or just missing—it is called a ____ value.

A. zero B. void C. null D. hidden

Computer Science & Information Technology