Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Cryptanalysis is used
A. to find some insecurity in a cryptographic scheme
A. to find some insecurity in a cryptographic scheme
See lessWhat is data encryption standard (DES)?
A. block cipher
A. block cipher
See lessIn cryptography, the order of the letters in a message is rearranged by
A. transpositional ciphers
A. transpositional ciphers
See lessWhich one of the following algorithm is not used in asymmetric key cryptography?
C. electronic code book algorithm
C. electronic code book algorithm
See lessIn asymmetric key cryptography, the private key is kept by
B. receiver
B. receiver
See lessIn cryptography, what is cipher?
A. algorithm for performing encryption and decryption
A. algorithm for performing encryption and decryption
See lessWhich one of the following is not used in media access control?
D. none of the mentioned
D. none of the mentioned
See lessWhich protocol assigns IP address to the client connected in the internet?
A. dhcp
A. dhcp
See lessWhich one of the following is not an application layer protocol used in internet?
C. resource reservation protocol
C. resource reservation protocol
See lessInternet works on
A. packet switching
A. packet switching
See less