Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
In affine block cipher systems if f(m)=Am + t, what is f(m1+m2) ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1088
DSA protocol is based on
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
441
The hash function
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
433
In hash function output length is fixed
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
482
The digital signature provides authentication to the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
448
Which should be used first to decrypt?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
483
Which algorithm is used for public key encryption?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
454
What is the key size allowed in PGP?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
471
Which operation is used in encryption using IDEA?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
469
The key size of DES is
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
441
These three ciphers can operate of ______ of plaintext and cipher text
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
448
Which block cipher has key length of 128 bits?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
472
PGP offers _____ block ciphers for message encryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
443
Total:
11022
Previous
582
583
584
585
586
Next
Go