Answer the following statements true (T) or false (F)

1. Symmetric encryption is used primarily to provide confidentiality.
2. Two of the most important applications of public-key encryption are
digital signatures and key management.
3. Cryptanalytic attacks try every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained.
4. The secret key is input to the encryption algorithm.
5. Triple DES takes a plaintext block of 64 bits and a key of 56 bits to
produce a ciphertext block of 64 bits.


1. True
2. True
3. False
4. True
5. False

Computer Science & Information Technology

You might also like to view...

A class that is not intended to be instantiated but is to be used only as a base class is called a(n) ____________.

a. abstract class b. dummy class c. placeholder d. entity class

Computer Science & Information Technology

The primary outcome of systems analysis is a prioritized list of system requirements and a recommendation of how to proceed with a project.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When using the Package Presentation for CD feature, you can add a password to prevent viewers from opening the presentation

Indicate whether the statement is true or false

Computer Science & Information Technology

An encrypted file cannot be opened without a password

Indicate whether the statement is true or false

Computer Science & Information Technology