Question 11
Electromechanical rotor-based cipher used in World War II
Question 12
Which of the following algorithms uses three different keys to encrypt the plain text?
Question 13
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Question 14
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
Question 15
A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?