Question 31
In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).
Question 32
Which one of the following uses three different keys, all of the same size?
Question 33
When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.
Question 34
Which of the following acts as a verifier for the certificate authority?
Question 35
Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.