Exam 3: Basic Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What type of cryptography uses two keys instead of just one,generating both a private and a public key?

(Multiple Choice)
4.7/5
(38)

Which of the following is a public key system that generates random public keys that are different for each session?

(Multiple Choice)
4.9/5
(40)

Which of the following is more secure than software encryption?

(Multiple Choice)
4.8/5
(35)

Which key exchange requires Alice and Bob to each agree upon a large prime number and related integer?

(Multiple Choice)
5.0/5
(27)

If using the MD5 hashing algorithm,what is the length to which each message is padded?

(Multiple Choice)
4.8/5
(35)

Which of the following asymmetric cryptography algorithms is most commonly used?

(Multiple Choice)
4.8/5
(35)

What type of message authentication code uses hashing to authenticate the sender by using both a hash function and a secret cryptographic key?

(Multiple Choice)
4.9/5
(19)

Ciphertext is the scrambled and unreadable output of encryption.

(True/False)
4.9/5
(35)

The XOR cipher is based on the binary operation eXclusive OR that compares two bits.

(True/False)
4.8/5
(39)

Which of the following is not one of the functions of a digital signature?

(Multiple Choice)
4.8/5
(27)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)