This topic contains a solution. Click here to go to the answer

Author Question: Protection against active attacks (falsification of data and transactions) is known as ___________ . ... (Read 80 times)

nummyann

  • Hero Member
  • *****
  • Posts: 576
Protection against active attacks (falsification of data and transactions) is known as ___________ .
 
  What will be an ideal response?

Question 2

The purpose of the _________ algorithm is to enable two users to exchange a secret key securely that then can be used for subsequent encryption of messages and depends on the difficulty of computing discrete logarithms for its effectiveness.
 
  A. Diffie-Hellman  B. RSA
 
  C. DSS  D. Rivest-Adleman



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
Marked as best answer by a Subject Expert

shoemake

  • Sr. Member
  • ****
  • Posts: 343
Answer to Question 1

MESSAGE AUTHENTICATION

Answer to Question 2

A





 

Did you know?

There are more bacteria in your mouth than there are people in the world.

Did you know?

Egg cells are about the size of a grain of sand. They are formed inside of a female's ovaries before she is even born.

Did you know?

The word drug comes from the Dutch word droog (meaning "dry"). For centuries, most drugs came from dried plants, hence the name.

Did you know?

The first oral chemotherapy drug for colon cancer was approved by FDA in 2001.

Did you know?

More than 150,000 Americans killed by cardiovascular disease are younger than the age of 65 years.

For a complete list of videos, visit our video library