Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
446
PGP system uses
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
395
Pretty good privacy program is used for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
416
In a trapdoor function, the functions are easy to go in
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
417
In public key cryptosystem which is kept as public?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
419
In public key cryptosystem _____ keys are used for encryption and decryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
428
A symmetric cipher system has an IC of 0.041. What is the length of the key ‘m’?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
669
Consider the cipher text message:
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
429
Consider the cipher text message with relative frequencies:
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1087
If all letters have the same chance of being chosen, the IC is approximately
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1123
The Index of Coincidence for English language is approximately
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1104
On Encrypting “cryptography” using Vignere Cipher System using the keyword “LUCKY” we get cipher text
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1368
On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text-
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1385
Total:
11022
Previous
585
586
587
588
589
Next
Go