<< Prev Question Next Question >>

Question 45/66

When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (66q)
Question 1: John is going to use RSA to encrypt a message to Joan. What ...
Question 2: Bob's password is hashed, and so is John's. Even though they...
Question 3: John is trying to explain the basics of cryptography to a gr...
Question 4: If Bob is using asymmetric cryptography and wants to send a ...
Question 5: Collision resistance is an important property for any hashin...
Question 6: Which of the following algorithms uses three different keys ...
Question 7: What is an IV?
Question 8: Network of trusted certificate authority servers. Use asymme...
Question 9: Original, unencrypted information is referred to as ____....
Question 10: A disk you rotated to encrypt/decrypt. Created by Leon Alber...
Question 11: Ferris has been assigned the task of selecting security for ...
Question 12: With Cipher-block chaining (CBC) what happens?...
1 commentQuestion 13: You are explaining basic mathematics to beginning cryptograp...
Question 14: This algorithm was published by the German engineering firm ...
Question 15: Which of the following is a protocol for exchanging keys?...
Question 16: Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output...
Question 17: What is Kerchoff's principle?
Question 18: Which one of the following are characteristics of a hash fun...
Question 19: In IPSec, if the VPN is a gateway-gateway or a host-gateway,...
Question 20: Which of the following is generally true about key sizes?...
Question 21: A type of frequency analysis used to attack polyalphabetic s...
Question 22: Developed by Netscape and has been replaced by TLS. It was t...
Question 23: In 2007, this wireless security algorithm was rendered usele...
Question 24: Which of the following is an asymmetric cipher?...
Question 25: Which one of the following is a symmetric key system using 6...
Question 26: A linear congruential generator is an example of what?...
Question 27: Fred is using an operating system that stores all passwords ...
Question 28: Which of the following asymmetric algorithms is described by...
Question 29: With Cipher feedback (CFB) what happens?...
Question 30: You are trying to find a modern method for security web traf...
Question 31: Part of understanding cryptography is understanding the cryp...
Question 32: Encryption of the same plain text with the same key results ...
Question 33: Which one of the following uses three different keys, all of...
Question 34: John is responsible for VPNs at his company. He is using IPS...
Question 35: During the process of encryption and decryption, what keys a...
Question 36: A measure of the uncertainty associated with a random variab...
Question 37: Which of the following would be the weakest encryption algor...
Question 38: Which of the following equations is related to EC?...
Question 39: Which one of the following is an authentication method that ...
Question 40: A symmetric Stream Cipher published by the German engineerin...
Question 41: Which of the following is a cryptographic protocol that allo...
Question 42: In relationship to hashing, the term _____refers to random b...
Question 43: Manipulating individuals so that they will divulge confident...
Question 44: Denis is looking at an older system that uses DES encryption...
Question 45: When learning algorithms, such as RSA, it is important to un...
Question 46: Which of the following is required for a hash?...
Question 47: Which of the following is a fundamental principle of cryptog...
Question 48: Protocol suite provides a method of setting up a secure chan...
Question 49: Software for maintaining an on-the-fly-encrypted volume. Dat...
Question 50: In 1977 researchers and MIT described what asymmetric algori...
Question 51: Changing some part of the plain text for some matching part ...
Question 52: The most widely used asymmetric encryption algorithm is what...
Question 53: MD5 can best be described as which one of the following?...
Question 54: Hash algortihm created by the Russians. Produces a fixed len...
Question 55: What size block does FORK256 use?...
Question 56: What is the basis for the difficulty in breaking RSA?...
Question 57: What is the formula m^e %n related to?...
Question 58: RFC 1321 describes what hash?
Question 59: Which of the following is a substitution cipher used by anci...
Question 60: What is the name of the attack where the attacker obtains th...
Question 61: What is a "Collision attack" in cryptography?...
Question 62: A number that is used only one time, then discarded is calle...
Question 63: A cryptographic hash function which uses a Merkle tree-like ...
Question 64: Which of the following Secure Hashing Algorithm (SHA) produc...
Question 65: Which of the following techniques is used (other than brute ...
Question 66: With Electronic codebook (ECB) what happens:...