Which cryptographic algorithm forms the basis of the El Gamal cryptosystem?
Show
Get full access to CISSP®: Certified Information Systems Security Professional: Study Guide, Fourth Edition and 60K+ other titles, with free 10-day trial of O'Reilly. There's also live online events, interactive content, certification prep materials, and more. Which of the following forms the basis for the classification of cryptographic algorithms?Cryptography is classified into two categories based on the types of keys and encryption algorithms: Symmetric Key Cryptography (Secret key) Asymmetric Key Cryptography (Public key)
What cryptosystem provides the encryption decryption technology for the commercial version?What cryptosystem provides the encryption/decryption technology for the commercial version of Phil Zimmerman's Pretty Good Privacy secure email system? Pretty Good Privacy uses a "web of trust" system of digital signature verification. The encryption technology is based on the IDEA private key cryptosystem.
Which one of the following used as key in a cryptographic algorithm?Explanation: As the key can be any string of bits, all the mentioned options are capable of becoming a key in a cryptographic algorithm. 6) A mechanism used to encrypt and decrypt data.
Which of the following numbers will always be the largest in the RSA public key cryptosystem?In the RSA public key cryptosystem, which one of the following numbers will always be largest? The Correct Answer is B. Explanation: The number n is generated as the product of the two large prime numbers p and q. Therefore, n must always be greater than both p and q.
|