Question
ANYONE PLEASE? Jack wants to send Jill a secret message over email. What should he use to encrypt the message? -Jack's public key -Jack's private
ANYONE PLEASE?
Jack wants to send Jill a secret message over email. What should he use to encrypt the message?
-Jack's public key
-Jack's private key
-Jill's public key
- Jill's private key
Jill wants to respond to Jack with a digitally signed secret message. The message is very large, and contains a video of their daughter Jane inside of it. What components are necessary for this message to be SENT correctly? (select all that apply)
-Jack's public key
-Jack's private key
-Jill's public key
- Jill's private key
-Hash of the entire message
-Hash of a private key
Rijndael can utilize all of the following key sizes except:
-128
-168
-192
-256
Whereas the decimal number system is base 10 (i.e. 0-9), Hexadecimal numbers are base 16 (i.e. 0-9 and A-F). From a computer's perspective, each hex number requires 4 bits. Given this information, what hashing algorithm could be used to output the following hash (ignore the spaces, they are merely there to help you visually)?
8F E4 61 0B 59 C7 BA A6 23 7A AE 12 43 90 1B C2 DF E1 3A F7
-MD5
-SHA-1
-SHA-256
-SHA-512
In the coming future, quantum computing will make all asymmetric algorithms obsolete.
-True or False
If you are using Elliptic curve cryptography (ECC) with 128-bit key size, this is roughly comparable security-wise to using RSA with ____ bit key size.
-128
-256
-512
-3072
A secure email system which allows for easily scaling up to hundreds, thousands, or even more individuals is:
-MIME
-PGP
-S/MIME
-GPG
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started