Multiple Choice
Public-key algorithms are based on __________ .
A) permutation
B) mathematical functions
C) substitution
D) symmetry
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q1: Asymmetric encryption transforms plaintext into ciphertext.
Q2: A _ is when two sides cooperate
Q3: A _ is a cryptographic algorithm that
Q4: If the authenticator is encrypted with the
Q5: A single algorithm that will calculate the
Q7: Five possible approaches to attacking the RSA
Q8: the most widely used public-key cryptosystem is
Q9: the _ scheme is a block cipher
Q10: the scrambled message produced as output is
Q11: A _ is a digital document issued