Demonstration and Implementation of Cryptographic Algorithms

Pre Test

  1. An asymmetric-key(or public key) cipher uses?
  2. a. 1 Key
    b. 2 Key
    c. 3 Key
    d. 4 Key

  3. We use cryptography term to transforming messages to make them secure and immune to?
  4. a. Change
    b. Idle
    c. Attacks
    d. Defend

  5. Which of the following is a Symmetric key algorithm?
  6. a. XOR
    b. RSA
    c. Diffie-Hellman
    d. None of the above

  7. What is the restriction of RSA algorithm?
  8. a. value of P must be less than the value of n
    b. value of P must be greater than the value of n
    c. value of P must be equal to the value of n
    d. Both a and c

  9. The original message, before being transformed, is called?
  10. a. Encrypted Text
    b. Decrypted Text
    c. Cipher Text
    d. Plain Text