Question 36

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?
  • Question 37

    WPA2 uses AES for wireless data encryption at which of the following encryption levels?
  • Question 38

    When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.
  • Question 39

    If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.
  • Question 40

    The reverse process from encoding - converting the encoded message back into its plaintext format.