In cryptography, original message, before being transformed, is called
DSS stands for:
An encryption algorithm transforms plaintext into
One commonly used public-key cryptography method is the ______...
Cryptography ensures:
Ciphers of today are called round ciphers because they involve
AES stands for:
A hash function guarantees integrity of a message. It guarantees that...
SHA means:
The field which deals with _____ called cryptography.
In cryptography
In asymmetric encryption
How many rounds of processing uses DES?
Cryptography can provide:
RSA stands for
RSA involves very large _____ numbers?
The total number of rounds in DES algorithm.
In a(n) ________ cipher, the same key is used by both the sender and...
The sender "signs" a message as:
In symmetric-key cryptography, the key used by sender and receiver is
DES has an initial and final permutation block and _________ rounds.
Keys used in cryptography are:
The method of hiding the secret is called…
Cryptography algorithms (ciphers) are divided into:
Diffie-Hellman key exchange is vulnerable to:
Secure hash algorithm(SHA) developed by:
What is the purpose of access control list?
Public key cryptosystem provides confidentiality:
Public key cryptosystem provides authentication:
Authentication is:
Message privacy means that sender and receiver expect:
DES algorithm uses total ______ subkeys.
In symmetric cryptography, which of the following MUST be true.
Digital Signatures are:
Which of the following method provides a one-time session key for two...
The process to discover plaintext or key is known as
Message _____ means that the data must arrive at the receiver exactly...
To check integrity of a message or document, receiver creates the :
_____________ is the science and art of transforming messages to make...
What does multilevel security mean?
The ________ method provides a one-time session key for two parties.
Advanced Encryption Standard (AES), has three different configurations...
Operation in AES is based on
What is Confidentiality?
What is Availability?
AES is
The _______ is a number or a set of numbers on which the cipher...
The purpose of hash function is to
What is Computer Security
DES is a(n) ________ method adopted by the U.S. government.
DES uses a key generator to generate sixteen _______ round keys.
Which of the following is not property of hash functions?
Message _______ means that the receiver is ensured that the message is...
AES input data is
Asymmetric Keys:
Public Key Certificate:
Which of the following is not used for symmetric encryption?
What is Integrity?
In AES, 192 bit key has:
________ means to prove the identity of the entity that tries to...
The ________ cipher reorders the plaintext characters to create a...
Authentication protocol:
A message is authentic and digitally signed if sent with:
In RSA:
Symmetric encryption:
SHA-1 has a message digest of :
RSA was presented in
How many levels are covered in multilevel security
Which of the following refers requirement of digital signature?
No read up (read down) means
A(n) ______ is a keyless substitution cipher with N inputs and M...
What is the encryption key size of DES
Message digest is referred to:
Some operating systems (e.g. Windows) include deny or negative access...
Difficulty of Diffie-Hellman algorithm depends on:
Heart of Data Encryption Standard (DES), is the
In symmetric key cryptography, key(s) used for encryption and...
What is the difference between stream cipher and one-time pad?
Which of the following is an active attack? I. Release of message...
What is the size of round key for DES algorithm?
The purpose of Diffie-Hellman algorithm:
The first published public-key algorithm
No write down(write up) means
Number of submissions for SHA-3 algorithm:
Public Keys Cryptography Algorithm:
Biometrics represents:
A digital signature needs a:
Public Key Infrastructure:
AES is
Public key cryptosystem provides availability:
Define a subject of Access Control List.
A file is created by a certain user, who becomes its owner. The owner...
What is the difference between stream cipher and one-time pad?
Public-key encryption has ___ ingredients:
Asymmetric encryption:
Diffusion
A(n) _______is a keyless transposition cipher with N inputs and M...
Alice goes to a movie theater and purchases a ticket for her favorite...
Define an object of Access Control List.
The Caesar cipher is a _______cipher that has a key of 3