COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

CRYPTOGRAPHY AND ENCRYPTION

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which of the algorithms listed below does not fall into the category of asymmetric encryption?
A
RSA
B
GPG
C
DSA
D
AES
E
PGP
Explanation: 

Detailed explanation-1: -Mining is not a part of Asymmetric Encryption.-Asymmetric encryption involves two keys, private and public.

Detailed explanation-2: -Which one of the following algorithm is not used in asymmetric-key cryptography? Explanation: Electronic code book algorithm is a block cipher method in which each block of text in an encrypted message corresponds to a block of data. It is not feasible for block sizes smaller than 40 bits.

Detailed explanation-3: -The two main uses of asymmetric-key algorithms are public-key encryption and digital signatures. Public-key encryption is a method where anyone can send an encrypted message within a trusted network of users.

There is 1 question to complete.