A) mode of operation
B) hash function
C) cryptanalysis
D) brute-force attack
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) data authenticator
B) strong hash function
C) weak hash function
D) digital signature
Correct Answer
verified
Multiple Choice
A) private-key
B) public-key
C) preimage resistant
D) advanced
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) use longer keys
B) use shorter keys
C) use more keys
D) use less keys
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) digital signature
B) keystream
C) one way hash function
D) secret key
Correct Answer
verified
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) secret key
B) digital signature
C) keystream
D) hash function
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) SHA
B) RSA
C) AES
D) DSS
Correct Answer
verified
Showing 21 - 40 of 45
Related Exams