Podcast
Questions and Answers
Which of the following is NOT required for a hash?
Which of the following is NOT required for a hash?
What does a 'collision' refer to in cryptography?
What does a 'collision' refer to in cryptography?
What is the purpose of a 'salt' in cryptography?
What is the purpose of a 'salt' in cryptography?
Which hash is described in RFC 1321?
Which hash is described in RFC 1321?
Signup and view all the answers
What is the average earning of a seller per month by selling study notes on Docmerit?
What is the average earning of a seller per month by selling study notes on Docmerit?
Signup and view all the answers
What is NOT mentioned as an upload on Docmerit?
What is NOT mentioned as an upload on Docmerit?
Signup and view all the answers
What is the size block used by FORK256?
What is the size block used by FORK256?
Signup and view all the answers
In 1977, researchers at MIT described which asymmetric algorithm?
In 1977, researchers at MIT described which asymmetric algorithm?
Signup and view all the answers
What is the formula (M^e)(%n) related to?
What is the formula (M^e)(%n) related to?
Signup and view all the answers
Which of the following equations is related to EC?
Which of the following equations is related to EC?
Signup and view all the answers
What is defined by U.S. Patent 5,231,668 and FIPS 186?
What is defined by U.S. Patent 5,231,668 and FIPS 186?
Signup and view all the answers
What is X.509?
What is X.509?
Signup and view all the answers
What is contained in a CRL?
What is contained in a CRL?
Signup and view all the answers
What does the Online Certificate Status Protocol (OCSP) provide?
What does the Online Certificate Status Protocol (OCSP) provide?
Signup and view all the answers
In terms of cryptanalysis, what does it mean to break a cipher?
In terms of cryptanalysis, what does it mean to break a cipher?
Signup and view all the answers
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
Signup and view all the answers
What is a TGS?
What is a TGS?
Signup and view all the answers
What is Kerchoff's principle?
What is Kerchoff's principle?
Signup and view all the answers
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publically disclosed without damaging security?
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publically disclosed without damaging security?
Signup and view all the answers
A process that puts a message into the least significant bits of a binary file is called what?
A process that puts a message into the least significant bits of a binary file is called what?
Signup and view all the answers
If you wished to see a list of revoked certificates from a CA, where would you look?
If you wished to see a list of revoked certificates from a CA, where would you look?
Signup and view all the answers