Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
Private key algorithm is used for _____ encryption and public key algorithm is used for _____ encryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
485
PGP system uses
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
450
Pretty good privacy program is used for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
454
In a trapdoor function, the functions are easy to go in
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
464
In public key cryptosystem which is kept as public?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
458
In public key cryptosystem _____ keys are used for encryption and decryption
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
467
A symmetric cipher system has an IC of 0.041. What is the length of the key ‘m’?
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
714
Consider the cipher text message:
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
465
Consider the cipher text message with relative frequencies:
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1130
If all letters have the same chance of being chosen, the IC is approximately
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1161
The Index of Coincidence for English language is approximately
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1159
On Encrypting “cryptography” using Vignere Cipher System using the keyword “LUCKY” we get cipher text
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1416
On Encrypting “thepepsiisintherefrigerator” using Vignere Cipher System using the keyword “HUMOR” we get cipher text-
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
1431
Total:
11022
Previous
585
586
587
588
589
Next
Go