Cryptography

1: An asymmetric-key (or public-key) cipher uses

2: The cryptography algorithms (ciphers) are divided into

3: If 10 people needs to communicate securely with each other, how many number of secret keys will be required? (Secret Key Cryptography)

4: Which is the largest disadvantage of the symmetric Encryption?

5: Which of the following is not a principle of data security?

6: If 10 people needs to communicate securely with each other, how many number of keys will be required? (Public Key Cryptography)

7: Using asymmetric encryption, Alice uses which key to send a message to Bob:

8: Which of the following is not possible through hash value?

9: Using asymmetric encryption, Alice uses which key to open a message received from Bob

10: Which of the following is not a property of Hash Function?