State the following statement as true or false:
1) SHA-256 (with 256-bit output) is more resistant to the attacks based on birthday paradox than SHA-1.
2) Key reuse is deadly for the stream ciphers such as RC4.
3) One of the advantages of Tor as opposed to the basic onion routing is that transmitting the messages over an established
Tor circuit does not need any public-key operations.