The __________ method is ideal for a short amount of data and is the appropriate mode to use if you want to transmit a DES or AES key securely.
A. cipher feedback mode
B. counter mode
C. output feedback mode
D. electronic codebook mode
D. electronic codebook mode
Computer Science & Information Technology
You might also like to view...
A graphical representation of numeric data is a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
A security technician would like to obscure sensitive data within a file so that it can be transferred without causing suspicion.Which of the following technologies would BEST be suited to accomplish this?
A. Transport Encryption B. Stream Encryption C. Digital Signature D. Steganography
Computer Science & Information Technology