Question 21

Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
  • Question 22

    Denis is looking at an older system that uses DES encryption. A colleague has told him that DES is insecure due to a small key size. What is the key length used for DES?
  • Question 23

    Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.
  • Question 24

    With Electronic codebook (ECB) what happens:
  • Question 25

    The ATBASH cipher is best described as what type of cipher?