What is the goal of cryptanalysis?
What is the goal of cryptanalysis?
MD5 produces a ___-bit digest.
MD5 produces a ___-bit digest.
Which of the following key sizes is not offered with Rijndael?
Rijndael offers multiple key sizes, however it cannot be arbitrary. Which of the following key sizes is not offered with Rijndael?
What is this called?
One mode that triple-DES can work in uses three DES operations with an encrypt/decrypt/encrypt sequence and three separate keys. What is this called?
how many keys would be needed if there were 500 participating users?
In symmetric cryptography, how many keys would be needed if there were 500 participating users?
Which of the following security technologies’ strength is built upon being collision free?
Which of the following security technologies’ strength is built upon being collision free?
Karen encrypts data with a private key and sends it to Bob. By doing this Karen is proving ____________.
Karen encrypts data with a private key and sends it to Bob. By doing this Karen is proving ____________.
Which of the following is not considered a disadvantage?
Symmetric cryptography has advantages and disadvantages. Which of the following is not considered a disadvantage?
which of the following security services?
Cryptographic algorithms can provide all but which of the following security services?
Which of the following algorithms are similar to one-time pads?
Which of the following algorithms are similar to one-time pads?