Which of the following is used to encrypt email and create digital signatures?
The most common way steganography is accomplished is via which one of the following?
What type of encryption uses different keys to encrypt and decrypt the message?
Which of the following is a key exchange protocol?
The most widely used asymmetric encryption algorithm is what?
Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m.
All of the following are key exchange protocols except for____
If you use substitution alone, what weakness is present in the resulting cipher text?
What does the OCSP protocol provide?
A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.