Answer the following statements true (T) or false (F)

11. Public-key cryptography is asymmetric.
12. Public-key algorithms are based on simple operations on bit patterns.
13. The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.
14. An important element in many computer security services and applications is the use of cryptographic algorithms.
15. Some form of protocol is needed for public-key distribution.


1. True
2. False
3. False
4. True
5. True

Computer Science & Information Technology

You might also like to view...

MC To access a class attribute of a class where no objects exist, the programmer must______ .

a) create a temporary object, access the attribute and destroy the object. b) use the class name followed by the dot operator and attribute name. c) create a reference to the class. d) None of the above.

Computer Science & Information Technology

A theme applies ________ to the report

A) a set of colors only B) a font only C) a set of fonts and a set of colors D) a font color only

Computer Science & Information Technology

In the Find and Replace dialog box, Match Case is used to match the:

A) font. B) color. C) special character. D) capitalization.

Computer Science & Information Technology

A user has installed a new video card. Now when Windows 7 boots, nothing displays on the screen. What WinRE tool should the technician use to solve this problem?

A) Startup Repair B) Device Manager C) Task Manager D) Complete PC Restore

Computer Science & Information Technology