Answer the following statements true (T) or false (F)
1. Public-key encryption is more secure from cryptanalysis than symmetric encryption.
2. Much of the theory of public-key cryptosystems is based on number theory.
3. Asymmetric algorithms rely on one key for encryption and a different but related key for decryption.
4. The encryption algorithm performs various transformation on the ciphertext.
5. If the authenticator is encrypted with the sender's private key, it serves as a signature that verifies origin, content, and sequencing.
1. FALSE
2. TRUE
3. TRUE
4. FALSE
5. TRUE
You might also like to view...
A(n) ________ stores a sequence of commands that can be performed as one task
Fill in the blank(s) with correct word
In the following function declaration, the variable size is known as a _________________.
int myFunction ( int size);