Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES.
Indicate whether the statement is true or false.
Question 2
In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010.
A. SHA-1 B. SHA-512
C. SHA-256 D. SHA-2