Question 21
Which of the following is a protocol for exchanging keys?
Question 22
Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.
Question 23
The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).
Question 24
Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.
Question 25
A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.