Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
In affine block cipher systems if f(m)=Am + t, what is f(m1+m2) ?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1092
DSA protocol is based on
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
446
The hash function
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
439
In hash function output length is fixed
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
489
The digital signature provides authentication to the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
458
Which should be used first to decrypt?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
488
Which algorithm is used for public key encryption?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
459
What is the key size allowed in PGP?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
478
Which operation is used in encryption using IDEA?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
473
The key size of DES is
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
446
These three ciphers can operate of ______ of plaintext and cipher text
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
451
Which block cipher has key length of 128 bits?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
478
PGP offers _____ block ciphers for message encryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
449
Total:
11022
Previous
582
583
584
585
586
Next
Go