What would indicate that a message had been modified?
What would indicate that a message had been modified?
Which of the following is not a property or characteristic of a one-way hash function?
Which of the following is not a property or characteristic of a one-way hash function?
Brute-force attacks have increased because ___________.
Brute-force attacks have increased because ___________.
What is the goal of cryptanalysis?
What is the goal of cryptanalysis?
MD5 produces a ___-bit digest.
MD5 produces a ___-bit digest.
Which of the following key sizes is not offered with Rijndael?
Rijndael offers multiple key sizes, however it cannot be arbitrary. Which of the following key sizes is not offered with Rijndael?
What is this called?
One mode that triple-DES can work in uses three DES operations with an encrypt/decrypt/encrypt sequence and three separate keys. What is this called?
how many keys would be needed if there were 500 participating users?
In symmetric cryptography, how many keys would be needed if there were 500 participating users?
Which of the following security technologies’ strength is built upon being collision free?
Which of the following security technologies’ strength is built upon being collision free?
Karen encrypts data with a private key and sends it to Bob. By doing this Karen is proving ____________.
Karen encrypts data with a private key and sends it to Bob. By doing this Karen is proving ____________.
