Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Ask a Question
Top 100+ questions in The Art of Cryptography
Home
Questions
The Art of Cryptography
0
votes
Q: Kerchkoff’s principle emphasizes that the cryptosystem should be accessible to the adversary without inconvenience.
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#kerchkoffs-principle
0
votes
Q: Based on the network security protocols, which of the following algorithms are used to generate message digests?
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#network-security-protocols
0
votes
Q: The use of hashing algorithms includes ________.
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#hashing-algorithms
0
votes
Q: Transmission errors are propagated in the following modes, except __________.
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#transmission-errors
0
votes
Q: Which of the following is widely used in cryptography to create a trapdoor function to facilitate the exchange of keys?
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#cryptography
#trapdoor-function
0
votes
Q: Which among the following may be addressed using message authentication?
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#message-authentication
0
votes
Q: The primary goal of cryptanalysis is to __________.
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#cryptanalysis
+1
vote
Q: The Diffie-Hellman algorithm exploits the computational complexity of the __________ problem.
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#diffie-hellman-algorithm
0
votes
Q: The number of keys used in Triple DES algorithm is __________.
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#triple-des-algorithm
0
votes
Q: X signs a message digitally and sends it to Y. Which of the following is required for Y to verify the authenticity of the message?
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#x-sign
#y-sign
0
votes
Q: The avalanche effect is an undesirable property in cryptographic algorithms.
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#avalanche-effect
0
votes
Q: Which among the following is the most resistant to frequency analysis?
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#resistant-to-frequency
#frequency-analysis
+1
vote
Q: The Diffie-Hellman algorithm is applicable for the exchange of keys between two parties only.
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#diffie-hellman-algorithm
0
votes
Q: Which among the following algorithms is designed based on the Feistel Cipher?
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
feistel-cipher
0
votes
Q: Basic Cryptographic Terms
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#basic-cryptographic-terms
0
votes
Q: What is Cryptography?
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#what-is-cryptography
#cryptography
0
votes
Q: What is The Art of Cryptography
asked
Oct 21, 2020
in
The Art of Cryptography
by
rahuljain1
#art-of-cryptography
#cyptography
To see more, click for the
full list of questions
or
popular tags
.
...