Question 36
Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?
Question 37
WPA2 uses AES for wireless data encryption at which of the following encryption levels?
Question 38
When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.
Question 39
If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.
Question 40
The reverse process from encoding - converting the encoded message back into its plaintext format.
