Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
The International Data Encryption Algorithm (IDEA) was developed by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
477
For RSA to work, the value of P must be less than the value of
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
504
An encryption algorithm transforms the plaintext into
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
488
In Cryptography, the input bits are rotated to right or left in
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
496
In Cryptography, the original message, before being transformed, is called
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
465
The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
507
A substitution cipher replaces one symbol with
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
518
The cryptography algorithms (ciphers) are divided into
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
499
DES stands for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
499
The heart of Data Encryption Standard (DES), is the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
480
The substitutional cipers are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
475
The shift cipher is sometimes referred to as the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
496
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
546
Total:
11022
Previous
592
593
594
595
596
Next
Go