Multiple Choice
Public key cryptography also called as__________________________________________
A) asymmetric key cryptography
B) symmetric key cryptography
C) both a and b
D) none of the above
Correct Answer:

Verified
Correct Answer:
Verified
Q11: In asymmetric key cryptography, the private key
Q12: RSA algorithm is best example of_ <br>A)asymmetric key
Q13: USENET falls under which category of public
Q14: IPSec is designed to provide security at
Q15: The man-in-the-middle attack can endanger the security
Q17: An asymmetric-key (or public-key) cipher uses<br>A)1 key<br>B)2
Q18: Hash function is used for_ <br>A)message authentication<br>B)digital signature<br>C)both
Q19: In Asymmetric-Key Cryptography, although RSA can be
Q20: In RSA, we select a value 'e'
Q21: PGP makes use of which cryptographic algorithm?<br>A)rsa<br>B)aes<br>C)des<br>D)robin