edited by
2,233 views
1 votes
1 votes

Match the following cryptographic algorithms with their design issues : 

$ \begin{array} {cIcI}   &  \textbf{List-I} & & \textbf{List-II} \\   \text{a.} & \text{DES} & \text{i.} & \text{Message Digest} \\ \text{b.} & \text{AES} & \text{ii.} & \text{Public key} \\  \text{c.} & \text{RSA} & \text{iii.} & \text{56-bit key} \\  \text{d.} & \text{SHA-1} & \text{iv.} & \text{128-bit key} \\ \end{array}$

  1. $\text{a-ii, b-i, c-iv, d-iii}$
  2. $\text{a-iii, b-i, c-iv, d-ii}$
  3. $\text{a-iii, b-iv, c-ii, d-i}$
  4. $\text{a-iv, b-i, c-ii, d-iii}$
edited by

1 Answer

Best answer
3 votes
3 votes

Answer C

  • DES is private key encryption with 56 bit key
  • AES is private key encryption with 128 bit key
  • RSA is a public key encryption algorithm
  • SHA Secure Hash Algorithm is a cryptographic hash function which produces a 160-bit  hash value known as a message digest.
selected by
Answer:

Related questions

0 votes
0 votes
1 answer
1
go_editor asked Nov 20, 2020
1,893 views
Using ‘RSA’ public key cryptosystem, if $p=3$, $q=11$ and $d=7$, find the value of $e$ and encrypt the number $’19’$$20, 19$$33,11$$3, 28$$77, 28$
27 votes
27 votes
5 answers
4
Akash Kanase asked Feb 12, 2016
9,331 views
Anarkali digitally signs a message and sends it to Salim. Verification of the signature by Salim requires.Anarkali's public key.Salim's public key.Salim's private key.Ana...