Question: Wireless security questions. Please answer the questions below with corrections of the false answers 1. True and False (T/F), if false, briefly state the reason
Wireless security questions. Please answer the questions below with corrections of the false answers

1. True and False (T/F), if false, briefly state the reason counter-example (in a few words) a. ( ) The decryption algorithm must be reverse of the encryption. b. ) The encryption/decryption algorithms are kept secret from others. c. ) Key distribution is a more difficult problem with more users involved. d.() Eavesdropping is easy for attackers in wireless communications e. ( 2 DES is abandoned because the algorithm itself is weak Symmetric ciphers are in general faster than public key ciphers All rounds in AES have the same structure (or functions) h. ( ) The input key for stream cipher must be changed on a per packet basis Message authentication code functions as a digital signature A hash function requires longer outputs than a MAC due to the lack of a key
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
