Question 46
Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.
Question 47
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
Question 48
The most common way steganography is accomplished is via which one of the following?
Question 49
Which of the following is an asymmetric algorithm related to the equation y^2 = x^3 + Ax + B?
Question 50
Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?