True/False
A hash function such as SHA-1 was not designed for use as a MACand cannot be used directly for that purpose because it does not rely on a secret key.
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q2: The key exchange protocol is vulnerable to
Q17: The operations performed during a round consist
Q19: SHA-3 algorithms must be designed to resist
Q20: The Secure Hash Algorithm (SHA) was developed
Q22: The DSS makes use of the _
Q23: The _ uses an algorithm that is
Q24: _ are analogous to a burglar guessing
Q25: _ was the first published public-key algorithm.<br>A)
Q26: The one-way hash function is important not
Q43: Unlike RSA, DSS cannot be used for