Exam 8: Cryptography Terminology and Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The technique in which when one character is replaced by another Character is called as?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

B

In Asymmetric-Key Cryptography, although RSA can be used to encrypt and decrypt actual messages, it is very slow if the message is

Free
(Multiple Choice)
4.7/5
(40)
Correct Answer:
Verified

C

In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

D

In asymmetric key cryptography, the private key is kept by __________

(Multiple Choice)
4.8/5
(33)

The__is a polygraphic substitution cipher based on linear algebra.

(Multiple Choice)
4.8/5
(37)

AES stands for?

(Multiple Choice)
4.9/5
(32)

The__model is 7 layer architecture where each layer is having some specific functionality to perform.

(Multiple Choice)
4.8/5
(50)

What is the 4th step in DES Algorithm?

(Multiple Choice)
4.8/5
(42)

Conversion of Cypher text to plain text?

(Multiple Choice)
4.8/5
(44)

In Symmetric schemes requires both parties to share how many secret key?

(Multiple Choice)
4.7/5
(42)

An act of protecting information from unauthorised disclouser to an entity.-

(Multiple Choice)
4.8/5
(36)

__is the practice of concealing a message within another message,image or file.

(Multiple Choice)
4.9/5
(30)

A way to ensure that the entity is indeed what it claims to be.-

(Multiple Choice)
4.9/5
(36)

In cryptography the original message before being transform is called

(Multiple Choice)
4.8/5
(33)

A hacker guessing suggested password to a program is call as?

(Multiple Choice)
4.8/5
(29)

Conversion of plain text into Cipher text is called as________.

(Multiple Choice)
5.0/5
(34)

The message which is not understandable is called as?

(Multiple Choice)
4.7/5
(37)

Blum Blum Shub Generator is based on which Algorithm?

(Multiple Choice)
4.8/5
(30)

An asymmetric-key (or public-key) cipher uses

(Multiple Choice)
4.8/5
(33)

Symmetric key encryption is also called as?

(Multiple Choice)
4.9/5
(42)
Showing 1 - 20 of 25
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)