In cryptography, original message, before being transformed, is called
DSS stands for:
An encryption algorithm transforms plaintext into
One commonly used public-key cryptography method is the ______...
Cryptography ensures:
AES stands for:
Ciphers of today are called round ciphers because they involve
A hash function guarantees integrity of a message. It guarantees that...
SHA means:
In asymmetric encryption
Cryptography can provide:
RSA involves very large _____ numbers?
The total number of rounds in DES algorithm.
In a(n) ________ cipher, the same key is used by both the sender and...
In cryptography
In symmetric-key cryptography, the key used by sender and receiver is
RSA stands for
The field which deals with _____ called cryptography.
The sender "signs" a message as:
How many rounds of processing uses DES?
DES has an initial and final permutation block and _________ rounds.
Keys used in cryptography are:
Diffie-Hellman key exchange is vulnerable to:
The method of hiding the secret is called…
Cryptography algorithms (ciphers) are divided into:
Secure hash algorithm(SHA) developed by:
What is the purpose of access control list?
Public key cryptosystem provides confidentiality:
Public key cryptosystem provides authentication:
DES algorithm uses total ______ subkeys.
Digital Signatures are:
Message privacy means that sender and receiver expect:
Authentication is:
In symmetric cryptography, which of the following MUST be true.
Which of the following method provides a one-time session key for two...
Message _____ means that the data must arrive at the receiver exactly...
To check integrity of a message or document, receiver creates the :
_____________ is the science and art of transforming messages to make...
What does multilevel security mean?
The process to discover plaintext or key is known as
The ________ method provides a one-time session key for two parties.
Advanced Encryption Standard (AES), has three different configurations...
Operation in AES is based on
What is Confidentiality?
What is Availability?
The _______ is a number or a set of numbers on which the cipher...
AES is
The purpose of hash function is to
Which of the following is not property of hash functions?
DES is a(n) ________ method adopted by the U.S. government.
DES uses a key generator to generate sixteen _______ round keys.
What is Computer Security
AES input data is
Message _______ means that the receiver is ensured that the message is...
In AES, 192 bit key has:
Asymmetric Keys:
Public Key Certificate:
Which of the following is not used for symmetric encryption?
What is Integrity?
________ means to prove the identity of the entity that tries to...
A message is authentic and digitally signed if sent with:
In RSA:
The ________ cipher reorders the plaintext characters to create a...
SHA-1 has a message digest of :
RSA was presented in
How many levels are covered in multilevel security
Which of the following refers requirement of digital signature?
Symmetric encryption:
Authentication protocol:
No read up (read down) means
A(n) ______ is a keyless substitution cipher with N inputs and M...
Some operating systems (e.g. Windows) include deny or negative access...
What is the encryption key size of DES
In symmetric key cryptography, key(s) used for encryption and...
Message digest is referred to:
What is the difference between stream cipher and one-time pad?
Difficulty of Diffie-Hellman algorithm depends on:
Heart of Data Encryption Standard (DES), is the
The first published public-key algorithm
Which of the following is an active attack? I. Release of message...
What is the size of round key for DES algorithm?
The purpose of Diffie-Hellman algorithm:
No write down(write up) means
Number of submissions for SHA-3 algorithm:
A digital signature needs a:
Public Keys Cryptography Algorithm:
Biometrics represents:
AES is
Public Key Infrastructure:
Define a subject of Access Control List.
Public-key encryption has ___ ingredients:
Public key cryptosystem provides availability:
A file is created by a certain user, who becomes its owner. The owner...
Asymmetric encryption:
What is the difference between stream cipher and one-time pad?
Alice goes to a movie theater and purchases a ticket for her favorite...
Diffusion
A(n) _______is a keyless transposition cipher with N inputs and M...
Define an object of Access Control List.
The Caesar cipher is a _______cipher that has a key of 3