True/False
SHA-2 is the hashing method that is recommended by NIST.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q35: Any original message is called _.<br>A) plaintext<br>B)
Q36: In authentication in a cryptographic system, the
Q37: Digital certificates and digital signatures must be
Q38: Currently, quantum computer can crack keys that
Q39: Information security is a fairly recent issue-primarily
Q41: After two parties exchange session keys, what
Q42: Once security negotiation is finished, the next
Q43: AES offers four different alternative key lengths.
Q44: If a message has changed while in
Q45: An electronic signature provides _ and _.<br>A)