adplus-dvertising
frame-decoration

Question

There is no secret key in case of ____________

a.

Symmetric ciphers

b.

Asymmetric ciphers

c.

RSA encryption

d.

Alpha-numeric cryptography

Posted under Discrete Mathematics

Answer: (a).Symmetric ciphers

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. There is no secret key in case of ____________

Similar Questions

Discover Related MCQs

Q. _______ is an example of asymmetric ciphers.

Q. How many bits of message does the Secure Hash Algorithm produce?

Q. In a transposition cipher, the plaintext is constructed by the ________ of the ciphertext.

Q. There are 67 people in a company where they are using secret key encryption and decryption system for privacy purpose. Determine the number of secret keys required for this purpose?

Q. Using RSA algorithm what is the value of cipher test c if the plain text e = 7 and P = 5, q = 16 & n = 832. Determine the Euler’s totient function for the plain text?

Q. The public key of given user, in an RSA encryption system is e = 57 and n = 3901. What is the value of Euler’s totient function ϕ(n) for calculating the private key of the user?

Q. To encrypt a message _______ is used on the character’s positions.

Q. In a public key system, the cipher text received is C = 10 if RSA encryption used with a public key(e = 11, n = 77) to deduce the plain text. Determine the value of ϕ(n)?

Q. The ROT13 caesar cipher system has an offset of ___________

Q. ________ can decrypt traffic to make it available to all other network security functions such as web proxies.

Q. Suppose that there are two primes, p₁ = 229 and p₂ = 61. Find the value of z and Φ.

Q. What is the block size of RC6 Feistel block cipher?

Q. How many combinations of keys can be constructed from a 72 ciphertext stream cipher?

Q. The default key size of RC2 Feistel cipher is _______

Q. _______ are used as the base of the Public Key Infrastructure.

Q. In encryption, which of the following is the best text encoding technique?

Q. Let A’s public key is n=6, 736, 180, 7817, 961, 456, 267 and e = 5 and B sends the ciphertext. c = 456, 871, 122, 391, 882, 538 to A. Determine B’s message in numeric format?

Q. TEA cipher uses which of the following structure?

Q. If there are 2⁵⁶ cipher texts per plain text and a total of 2¹⁸ plaintexts of length 18 exists. Then determine the number of distinct ciphertexts?

Q. In which of the following systems, encryption slower than decryption?