Pre Test
- An asymmetric-key(or public key) cipher uses? a. 1 Key
- We use cryptography term to transforming messages to make them secure and immune to? a. Change
- Which of the following is a Symmetric key algorithm? a. XOR
- What is the restriction of RSA algorithm? a. value of P must be less than the value of n
- The original message, before being transformed, is called? a. Encrypted Text
b. 2 Key
c. 3 Key
d. 4 Key
b. Idle
c. Attacks
d. Defend
b. RSA
c. Diffie-Hellman
d. None of the above
b. value of P must be greater than the value of n
c. value of P must be equal to the value of n
d. Both a and c
b. Decrypted Text
c. Cipher Text
d. Plain Text
