In cryptography, original message, before being transformed, is called
DSS stands for:
An encryption algorithm transforms plaintext into
Ciphers of today are called round ciphers because they involve
One commonly used public-key cryptography method is the ______...
Cryptography ensures:
AES stands for:
A hash function guarantees integrity of a message. It guarantees that...
SHA means:
RSA involves very large _____ numbers?
The field which deals with _____ called cryptography.
In a(n) ________ cipher, the same key is used by both the sender and...
In cryptography
In asymmetric encryption
How many rounds of processing uses DES?
In symmetric-key cryptography, the key used by sender and receiver is
Cryptography can provide:
RSA stands for
The total number of rounds in DES algorithm.
The sender "signs" a message as:
DES has an initial and final permutation block and _________ rounds.
The method of hiding the secret is called…
Keys used in cryptography are:
Diffie-Hellman key exchange is vulnerable to:
Cryptography algorithms (ciphers) are divided into:
Public key cryptosystem provides confidentiality:
What is the purpose of access control list?
Secure hash algorithm(SHA) developed by:
Public key cryptosystem provides authentication:
Authentication is:
In symmetric cryptography, which of the following MUST be true.
Message privacy means that sender and receiver expect:
DES algorithm uses total ______ subkeys.
Which of the following method provides a one-time session key for two...
Digital Signatures are:
Operation in AES is based on
The process to discover plaintext or key is known as
Message _____ means that the data must arrive at the receiver exactly...
Advanced Encryption Standard (AES), has three different configurations...
To check integrity of a message or document, receiver creates the :
_____________ is the science and art of transforming messages to make...
What does multilevel security mean?
The ________ method provides a one-time session key for two parties.
What is Confidentiality?
What is Availability?
AES is
The _______ is a number or a set of numbers on which the cipher...
The purpose of hash function is to
Which of the following is not property of hash functions?
DES is a(n) ________ method adopted by the U.S. government.
DES uses a key generator to generate sixteen _______ round keys.
What is Computer Security
Message _______ means that the receiver is ensured that the message is...
AES input data is
Asymmetric Keys:
Public Key Certificate:
Which of the following is not used for symmetric encryption?
What is Integrity?
In AES, 192 bit key has:
Authentication protocol:
________ means to prove the identity of the entity that tries to...
In RSA:
The ________ cipher reorders the plaintext characters to create a...
SHA-1 has a message digest of :
How many levels are covered in multilevel security
Symmetric encryption:
A message is authentic and digitally signed if sent with:
RSA was presented in
No read up (read down) means
Which of the following refers requirement of digital signature?
A(n) ______ is a keyless substitution cipher with N inputs and M...
Some operating systems (e.g. Windows) include deny or negative access...
What is the encryption key size of DES
Message digest is referred to:
Difficulty of Diffie-Hellman algorithm depends on:
Heart of Data Encryption Standard (DES), is the
What is the difference between stream cipher and one-time pad?
Which of the following is an active attack? I. Release of message...
What is the size of round key for DES algorithm?
In symmetric key cryptography, key(s) used for encryption and...
The purpose of Diffie-Hellman algorithm:
No write down(write up) means
The first published public-key algorithm
Public Keys Cryptography Algorithm:
Number of submissions for SHA-3 algorithm:
Biometrics represents:
A digital signature needs a:
Public Key Infrastructure:
AES is
Public key cryptosystem provides availability:
What is the difference between stream cipher and one-time pad?
Define a subject of Access Control List.
A file is created by a certain user, who becomes its owner. The owner...
Public-key encryption has ___ ingredients:
Asymmetric encryption:
A(n) _______is a keyless transposition cipher with N inputs and M...
Alice goes to a movie theater and purchases a ticket for her favorite...
Diffusion
Define an object of Access Control List.
The Caesar cipher is a _______cipher that has a key of 3