Question 16
A real time protocol for verifying certificates (and a newer method than CRL).
Question 17
Which one of the following is an example of a symmetric key algorithm?
Question 18
Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186
Question 19
This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.
Question 20
Which of the following is a block cipher?