what is the function of P?
When using the 3DES encryption ( C = EK1[DK2[EK1[P]]] ) , what is the function of P?
which two of the following keys?
Public Key Cryptography systems use which two of the following keys?
what is this value called?
When a computer requires an input value to begin the cryptographic process, what is this value
called?
Which of the following are asymmetric encryption algorithms?
Which of the following are asymmetric encryption algorithms?
which of the following ciphers could you use?
If you wanted to use Public Key cryptography to encrypt data transmissions, which of the following
ciphers could you use?
what would you be using?
If you had a cipher that used a unique key every time you encoded text, what would you be using?
What can be used to remove any of the frequency and statistical relationship between unencrypted and encrypted
What can be used to remove any of the frequency and statistical relationship between
unencrypted and encrypted text? (Choose two)
Which of the following is a block cipher?
Which of the following is a block cipher?
what keys will Bob use to send an encrypted message to Alice?
When using DH, what keys will Bob use to send an encrypted message to Alice?
What type of encryption converts data from a variable-length to a fixed length piece of data?
What type of encryption converts data from a variable-length to a fixed length piece of data?