What is the minimum number of cryptographic keys necessary to achieve strong security when using the 3DES algorithm?

A. 1
B. 2
C. 3
D. 4

Answer: B. 2

Computer Science & Information Technology

You might also like to view...

Almost any individual resource can be virtualized

a. true b. false

Computer Science & Information Technology

Which of the following expressions has as its value the words "Hello World” surrounded by quotation marks?

(A) "Hello World" (B) Chr(34) & "Hello World" (C) Chr(34) & Hello World & Chr(34) (D) Chr(34) & "Hello World" & Chr(34)

Computer Science & Information Technology