Search results for cryptography

1 votes
2 answers
1
Asymmetric encryption is not suitable for ConfidentialityAuthenticationKey ExchangePrevention of Denail of Service
1 votes
1 answer
3
0 votes
2 answers
5
Match the following symmetric block ciphers with corresponding block and key sizes:$$\begin{array} {} & \textbf{List-I} & & \textbf{List-II} \\ \text{(a)} & \text{}\tex...
0 votes
0 answers
6
2 votes
4 answers
8
Which one of the following algorithm is not used in asymmetric key cryptography?RSA AlgorithmGillie-Hellman AlgorithmElectronic Code Book AlgorithmNone of the above
0 votes
1 answer
10
2 votes
2 answers
14
6 votes
3 answers
17
$\text{MD5}$ is a widely used hash function for producing hash value of$64$ bits$128$ bits$512$ bits$1024$ bits
27 votes
5 answers
20