Multiple Choice
The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange.
A) ECC
B) RSA
C) DSS
D) XOR
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q19: SHA-3 algorithms must be designed to resist
Q20: The Secure Hash Algorithm (SHA) was developed
Q21: A hash function such as SHA-1 was
Q22: The DSS makes use of the _
Q24: _ are analogous to a burglar guessing
Q25: _ was the first published public-key algorithm.<br>A)
Q26: The one-way hash function is important not
Q27: The Diffie-Hellman algorithm depends for its effectiveness
Q28: The National Institute of Standards and Technology
Q43: Unlike RSA, DSS cannot be used for