In cryptography, original message, before being transformed, is called
DSS stands for:
An encryption algorithm transforms plaintext into
One commonly used public-key cryptography method is the ______...
Cryptography ensures:
Ciphers of today are called round ciphers because they involve
AES stands for:
A hash function guarantees integrity of a message. It guarantees that...
SHA means:
In asymmetric encryption
Cryptography can provide:
RSA involves very large _____ numbers?
The field which deals with _____ called cryptography.
In a(n) ________ cipher, the same key is used by both the sender and...
In cryptography
How many rounds of processing uses DES?
In symmetric-key cryptography, the key used by sender and receiver is
RSA stands for
The total number of rounds in DES algorithm.
The sender "signs" a message as:
DES has an initial and final permutation block and _________ rounds.
Keys used in cryptography are:
Diffie-Hellman key exchange is vulnerable to:
The method of hiding the secret is called…
Cryptography algorithms (ciphers) are divided into:
What is the purpose of access control list?
Secure hash algorithm(SHA) developed by:
Public key cryptosystem provides confidentiality:
Public key cryptosystem provides authentication:
DES algorithm uses total ______ subkeys.
Digital Signatures are:
Message privacy means that sender and receiver expect:
Authentication is:
In symmetric cryptography, which of the following MUST be true.
To check integrity of a message or document, receiver creates the :
Which of the following method provides a one-time session key for two...
The process to discover plaintext or key is known as
Advanced Encryption Standard (AES), has three different configurations...
Operation in AES is based on
_____________ is the science and art of transforming messages to make...
What does multilevel security mean?
The ________ method provides a one-time session key for two parties.
Message _____ means that the data must arrive at the receiver exactly...
What is Confidentiality?
What is Availability?
AES is
The _______ is a number or a set of numbers on which the cipher...
Which of the following is not property of hash functions?
The purpose of hash function is to
DES is a(n) ________ method adopted by the U.S. government.
DES uses a key generator to generate sixteen _______ round keys.
What is Computer Security
Message _______ means that the receiver is ensured that the message is...
AES input data is
In AES, 192 bit key has:
Asymmetric Keys:
Public Key Certificate:
Which of the following is not used for symmetric encryption?
What is Integrity?
________ means to prove the identity of the entity that tries to...
A message is authentic and digitally signed if sent with:
RSA was presented in
In RSA:
The ________ cipher reorders the plaintext characters to create a...
SHA-1 has a message digest of :
How many levels are covered in multilevel security
Which of the following refers requirement of digital signature?
Symmetric encryption:
Authentication protocol:
No read up (read down) means
A(n) ______ is a keyless substitution cipher with N inputs and M...
Some operating systems (e.g. Windows) include deny or negative access...
What is the encryption key size of DES
In symmetric key cryptography, key(s) used for encryption and...
Message digest is referred to:
What is the difference between stream cipher and one-time pad?
Difficulty of Diffie-Hellman algorithm depends on:
Heart of Data Encryption Standard (DES), is the
The first published public-key algorithm
Which of the following is an active attack? I. Release of message...
What is the size of round key for DES algorithm?
No write down(write up) means
The purpose of Diffie-Hellman algorithm:
Number of submissions for SHA-3 algorithm:
Public Keys Cryptography Algorithm:
Biometrics represents:
A digital signature needs a:
Public Key Infrastructure:
AES is
Public key cryptosystem provides availability:
Define a subject of Access Control List.
Public-key encryption has ___ ingredients:
A file is created by a certain user, who becomes its owner. The owner...
What is the difference between stream cipher and one-time pad?
Asymmetric encryption:
Diffusion
Alice goes to a movie theater and purchases a ticket for her favorite...
Define an object of Access Control List.
A(n) _______is a keyless transposition cipher with N inputs and M...
The Caesar cipher is a _______cipher that has a key of 3