Which of the following techniques can be used by an administrator while working with the symmetric encryption cryptography? Each correct answer represents a complete solution. Choose all that apply.
The techniques used by an administrator while working with symmetric encryption cryptography are:
A. Block cipher
B. Stream cipher
Explanation:
A. Block cipher: Symmetric encryption algorithms that operate on fixed-size blocks of data, encrypting and decrypting the entire block at a time.
B. Stream cipher: Symmetric encryption algorithms that encrypt and decrypt data one bit or byte at a time, typically used for streaming data.
C. Transposition cipher: Transposition ciphers are a type of classical cipher and not specific to symmetric encryption cryptography.
D. Message Authentication Code (MAC): MAC is a technique for ensuring the integrity and authenticity of a message and is not directly related to symmetric encryption.
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
n00r1
10 months, 1 week ago