Q:

During decryption, we use the Inverse Initial Permutation (IP-1) before the IP

0

During decryption, we use the Inverse Initial Permutation (IP-1) before the IP.


  1. True
  2. False

All Answers

need an explanation for this answer? contact us directly to get an explanation for this answer

(a).True

need an explanation for this answer? contact us directly to get an explanation for this answer

total answers (1)

CRYPTOGRAPHY AND NETWORK SECURITY - DATA ENCRYPTION STANDARD MCQ

This question belongs to these collections

Similar questions


need a help?


find thousands of online teachers now
A preferable cryptographic algorithm should have a... >>
<< In the DES algorithm the 64 bit key input is short...