During the process of encryption and decryption, what keys are shared?
Answer : A
You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RS
Answer : C
In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?
Answer : C
Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.
Answer : D
What does Output feedback (OFB) do:
Answer : C
This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.
Answer : D
Which method of password cracking takes the most time and effort?
Answer : C