Question
a.
Public key cryptosystem
b.
Private key cryptosystem
c.
Public & Private key cryptosystem
d.
None of the mentioned
Posted under Cryptography and Network Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. Knapsack problem can be solved by
Similar Questions
Discover Related MCQs
Q. Merkle hellman is a symmetric cryptosystem.
View solution
Q. In Merkle Hellman method same key is used for encryption and decryption.
View solution
Q. Cipher system can be solved effectively by statistically using
View solution
Q. Encryption transformations are known as
View solution
Q. For n input bits the number of substitution patterns are
View solution
Q. In transposition, the plaintext letters are
View solution
Q. The substitution of the letters are done
View solution
Q. In cipher feedback method, encryption is done on
View solution
Q. In stream encryption, the key sequence repeats itself.
View solution
Q. In which method, key-stream is generated independently?
View solution
Q. Synchronous ciphers uses
View solution
Q. Public key cryptosystem uses same key for both encryption and decryption.
View solution
Q. Which should be kept as a secret in public key cryptosystem?
View solution
Q. Public key cryptosystem is also known as
View solution
Q. Euler’s totient function is determined by
View solution
Q. Pretty good privacy (PGP) security system uses
View solution
Q. Public key cryptosystem is used for the encryption of
View solution
Q. For digital signatures private key cryptosystem is used.
View solution
Q. Data compression includes
View solution
Q. PGP offers _____ block ciphers for message encryption.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cryptography and Network Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!