Answered step by step
Verified Expert Solution
Question
1 Approved Answer
10. Which of the following is a NON-cryptographic property of a good hash function? a. One-way-ness b. Weak-collision resistance c. Arbitrary-length input d. Strong-collision resistance
10. Which of the following is a NON-cryptographic property of a good hash function? a. One-way-ness b. Weak-collision resistance c. Arbitrary-length input d. Strong-collision resistance e. None of the above 11. What security service CANNOT be provided by a digital signature? a. Integrity b. Availability c. Non-repudiation d. Authentication e. None of the above 12. The security of Diffis-Hellman key exchange relies on which assumption? a. It is computationally infeasible to compute a GCD of two large numbers. b. It is computationally infeasible to compute an inverse modulo prime p. c. It is computationally infeasible to test whether a large number is prime. d. It is computationally infeasible to solve the discrete log problem. e, All of the above 13. The security of RSA encryption relies on which assumption? It is computationally infeasible to compute a GCD of two large numbers It is computationally infeasible to factor a large number It is computationally infeasible to test whether a large number is prime It is computationally infeasible to compute a square modulo n Allet the above a. b. c. d. e
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started