Save Time & improve Grades
- Questions Asked
- Experts
- Total Answered
Start Excelling in your courses, Ask an Expert and get answers for your homework and assignments!!
the ciphertext converted back into plaintext 1. Two parties, Party A and Party B, regularly exchange messages using public key cryptography. One party, Party A, believes that its private encryption key has been compromised. What action should Party B take? a. Request a new public key from Party A. b. Request a new private key from Party A. c. Send a new public key to Party A. d. Send a new private key to Party A. 2. The Advanced Encryption Standard is another name for which cipher: a. Digital Encryption Algorithm (DEA) b. 3DES c. Rijndael d. International Data Encryption Algorithm (IDEA) 3. The Data Encryption Standard: a. Is used by Secure Sockets Layer (SSL) encryption b. Has been replaced by the International Data Encryption Algorithm (IDEA) c. Uses a 64-bit encryption key d. Uses a 56-bit encryption key 4. Two parties are exchanging messages using public key cryptography. Which of the following statements describes the proper procedure for transmitting an encrypted message? a. The sender encrypts the message using the recipient- public key, and the recipient decrypts the message using the recipient- private key. b. The sender encrypts the message using the sender- public key, and the recipient decrypts the message using the recipient- public key. c. The sender encrypts the message using the sender- private key, and the recipient decrypts the message using the recipient- private key. d. The sender encrypts the message using the sender- public key, and the recipient decrypts the message using the sender- public key. 5. A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext? a. XORing it with the encryption key b. XORing it with the inverse of the encryption key c. ANDing it with the encryption key d. NANDing it with the encryption key Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help
Ask a question
Experts are online
Answers (1)
the ciphertext converted back into plaintext
Answer Attachments
1 attachments —