What is the minimum number of cryptographic keys necessary to achieve strong security when using the 3DES algorithm?
A. 1
B. 2
C. 3
D. 4
Answer: B. 2
Computer Science & Information Technology
You might also like to view...
Almost any individual resource can be virtualized
a. true b. false
Computer Science & Information Technology
Which of the following expressions has as its value the words "Hello World” surrounded by quotation marks?
(A) "Hello World" (B) Chr(34) & "Hello World" (C) Chr(34) & Hello World & Chr(34) (D) Chr(34) & "Hello World" & Chr(34)
Computer Science & Information Technology