Cryptographic hash functions execute faster in software than block ciphers.
(a) Statement is correct
(b) Statement is incorrect
(c) Depends on the hash function
(d) Depends on the processor
This question was addressed to me during an interview.
The doubt is from HMAC, DAA and CMAC in portion Message Authentication Codes, Whirlpool Algorithm and Key Management and Distribution of Cryptograph & Network Security