In cryptography, what is cipher?
In asymmetric key cryptography, the private key is kept by
Which one of the following algorithm is not used in asymmetric-key cryptography?
In cryptography, the order of the letters in a message is rearranged by
What is data encryption standard (DES)?
Cryptanalysis is used
Which one of the following is a cryptographic protocol used to secure HTTP connection?
Voice privacy in GSM cellular telephone protocol is provided by
ElGamal encryption system is
Cryptographic hash function takes an arbitrary block of data and returns