Multiple Choice
Digital signatures are
A) The transformation of data to produce ciphertext
B) The use of cryptography that allows a user to prove the source and integrity of data
C) Text that is unintelligible to the reader
D) A sequence of symbols that controls the operations of encipherment and decipherment
Correct Answer:

Verified
Correct Answer:
Verified
Q6: The current standard for secret key encryption
Q7: Ciphertext is<br>A) The transformation of data to
Q8: Hash functions use<br>A) 2 keys<br>B) 1 key<br>C)
Q9: In the context of encryption, a key
Q10: The word Cipher is based on an
Q12: Public key encryption is used primarily for<br>A)
Q13: Public key encryption techniques used in practice
Q14: In using public key encryption, messages are
Q15: Desirable properties In good encryption algorithms include<br>A)
Q16: Electronic Code Book ECB is not used