Exam 21: Public-Key Cryptography and Message Authentication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption.

(Multiple Choice)
4.9/5
(36)

______ has been issued as RFC 2014,has been chosen as the mandatory-to-implement MAC for IP Security,and is used in other Internet protocols,such as Transport Layer Security.

(Essay)
4.8/5
(31)

One of the simplest hash functions is the ________ of every block.

(Essay)
4.8/5
(27)

One of the first public-key schemes,_______,was developed in 1977 by Ron Rivest,Adi Shamir,and Len Adleman.

(Essay)
4.7/5
(26)

The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186,known as the __________.

(Multiple Choice)
4.9/5
(38)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)