Answer the following statements true (T) or false (F)
1. Symmetric encryption remains by far the most widely used of the two types of encryption.
2. Rotor machines are sophisticated precomputer hardware devices that use substitution techniques.
3. Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using different keys. It is also known as non-conventional encryption.
4. With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the key.
5. The process of converting from plaintext to ciphertext is known as deciphering or decryption.
1. TRUE
2. TRUE
3. FALSE
4. TRUE
5. FALSE
You might also like to view...
(Coin Tossing) Write a program that simulates coin tossing. For each toss of the coin, the program should print Heads or Tails. Let the program toss the coin 100 times and count the number of times each side of the coin appears. Print the results. The program should call a separate function flip that takes no arguments and returns 0 for tails and 1 for heads. [Note: If the program realistically simulates the coin tossing, then each side of the coin should appear approximately half the time.]
What will be an ideal response?
Candidate keys that are not used as primary keys are ________ keys
A) artificial B) natural C) composite D) alternate
____ is used to create a program's overall outline and describe tasks to be accomplished, and then details of these tasks are refined later.
A. Cohesion B. Top-down design C. Coupling D. Bottom-up design
You can quickly create a task from the Mail window by dragging an e-mail message from the Inbox to the Task List section of the status bar.
Answer the following statement true (T) or false (F)