Live Virtual Machine Lab 6.2
Which of the following algorithms are examples of lightweight cryptography? [Choose all that apply]
TWINE OTR
In asymmetric key encryption, what is the next step when a client initiates a session with a web server that is configured with a certificate? (NOT)The client shares the encrypted key (NOT)The web server decrypts the asymmetric key (NOT)The client takes the public key from the certificate *The web server sends a certificate to the web browser*
*The web server sends a certificate to the web browser*
What is the minimum key size in Elliptical Curve Cryptography (ECC)?
160-bits
How many keys are required in asymmetric encryption?
2
What is the key length of the Data Encryption Standard (DES) algorithm?
56-bit