Answer the following statements true (T) or false (F)

11. Public-key cryptography is asymmetric.
12. Public-key algorithms are based on simple operations on bit patterns.
13. The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.
14. An important element in many computer security services and applications is the use of cryptographic algorithms.
15. Some form of protocol is needed for public-key distribution.

1. True
2. False
3. False
4. True
5. True

Computer Science & Information Technology

You might also like to view...

A mouse ________ is an arrow that shows the position of the mouse

Fill in the blank(s) with correct word

Computer Science & Information Technology

The ________ level of Bloom's Taxonomy indicates students can make judgments about information based on evidence or criteria

Fill in the blank(s) with correct word

Computer Science & Information Technology