adplus-dvertising
frame-decoration

Question

Which of the following is not a property of good encryption technique ?

a.

Relatively simple for authorized users to encrypt and decrypt data

b.

Decryption key is extremely difficult for an intruder to determine

c.

Encryption depends on a parameter of the algorithm called the encryption key

d.

None of the mentioned

Answer: (d).None of the mentioned

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Which of the following is not a property of good encryption technique ?

Similar Questions

Discover Related MCQs

Q. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

Q. ___________ is widely used today for protecting data in transit in a variety of applications such as data transfer on the Internet, and on cellular phone networks.

Q. An electronic document that establishes your credentials when you are performing transactions.

Q. Encryption standard that is selected by the US government to replace DES.

Q. Triple-DES has ______ keys.

Q. Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption.

Q. DES stands for?

Q. In public key cryptography, a key that decrypts the message.

Q. An encryption technique with 2 keys is ______________

Q. A type of cipher that uses multiple alphabetic strings.

Q. Encryption is the study of creating and using decryption techniques.

Q. These ciphers replace a character or characters with a different character or characters, based on some key.

Q. An attack in which the user receives unwanted amount of e-mails.

Q. A technique in which a program attacks a network by exploiting IP broadcast addressing operations.

Q. Attack in which a user creates a packet that appears to be something else.

Q. A malicious code hidden inside a seemingly harmless piece of code.

Q. An indirect form of surveillance.

Q. Creating a computer or paper audit that can help detect wrong doings.

Q. Study of creating a d using encryption and decryption techniques.

Q. A unique piece of information that is used in encryption.