Discover
Questions library
Collections library
Find online teacher
login
Discover
questions library
Find online teacher
login
Popular searches:
if-else
class-diagram
flowchart
Polymorphism
Home
Questions
Questions
Study lists
Mohamad Eskandarane Questions
11022 Questions
The International Data Encryption Algorithm (IDEA) was developed by
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
434
For RSA to work, the value of P must be less than the value of
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
457
An encryption algorithm transforms the plaintext into
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
447
In Cryptography, the input bits are rotated to right or left in
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
455
In Cryptography, the original message, before being transformed, is called
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
430
The Advanced Encryption Standard (AES), has three different configurations with respect to the number of rounds and
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
460
A substitution cipher replaces one symbol with
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
464
The cryptography algorithms (ciphers) are divided into
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
453
DES stands for
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
463
The heart of Data Encryption Standard (DES), is the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
429
The substitutional cipers are
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
436
The shift cipher is sometimes referred to as the
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
448
In Asymmetric-Key Cryptography, the two keys, e and d, have a special relationship to
Networks
2022-06-01
Answers
30
Question
40
Followers
30
0
1
490
Total:
11022
Previous
592
593
594
595
596
Next
Go