Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
In affine block cipher systems if f(m)=Am + t, what is f(m1+m2) ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1055
DSA protocol is based on
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
408
The hash function
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
404
In hash function output length is fixed
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
443
The digital signature provides authentication to the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
401
Which should be used first to decrypt?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
434
Which algorithm is used for public key encryption?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
412
What is the key size allowed in PGP?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
424
Which operation is used in encryption using IDEA?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
432
The key size of DES is
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
404
These three ciphers can operate of ______ of plaintext and cipher text
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
421
Which block cipher has key length of 128 bits?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
434
PGP offers _____ block ciphers for message encryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
408
Total:
11022
Previous
582
583
584
585
586
Next
Go