1What are the essential ingredients of a symmetric cipher?
2What are the two basic functions used in encryption algorithms?
3How many keys are required for two people to communicate via a cipher?
4What is the difference between a block cipher and a stream cipher?
5What are the two general approaches to attacking a cipher?
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here