1.
In cryptography, what is cipher?
2.
In asymmetric key cryptography, the private key is kept by
3.
Which one of the following algorithm is not used in asymmetric-key cryptography?
4.
In cryptography, the order of the letters in a message is rearranged by
5.
What is data encryption standard (DES)?
6.
Cryptanalysis is used
7.
Which one of the following is a cryptographic protocol used to secure HTTP connection?
8.
Voice privacy in GSM cellular telephone protocol is provided by
9.
ElGamal encryption system is
10.
Cryptographic hash function takes an arbitrary block of data and returns