Which of the following statements related to a private key cryptosystem is FALSE?

A. The key used for decryption is known to the sender
B. Data Encryption Standard (DES) is a typical private key cryptosystem
C. Two different keys are used for the encryption and decryption
D. The encryption key should be secure


C. Two different keys are used for the encryption and decryption

Computer Science & Information Technology

You might also like to view...

Which is not one of four steps that a systems analyst must follow to design a good sample?

A) Determine the data to be collected or described. B) Determine the population to be sampled. C) Choose the type of population. D) Describe the sample size.

Computer Science & Information Technology

____ are set automatically when you install new software.

A. System Recovery Drive B. Malware C. System images D. Restore points

Computer Science & Information Technology

________ enables you to experiment with different variables or assumptions so you can compare the related outcomes.

A. PivotTables B. What-if analysis C. Goal seek D. Solver

Computer Science & Information Technology

In the Audio or Video dialog box, you can switch to the Details pane by first tapping or clicking the ____ button.

A. OneDrive B. Properties C. Views D. Organize

Computer Science & Information Technology