Which of the following is a function that takes a variable length string or message and produces a fixed length message digest?

Uses two keys: one to encrypt data and one to decrypt data

Encryption algorithm used for the Data Encryption Standard

Uses a single key to encrypt and decrypt data

A digital document that verifies the two parties exchanging data over the Internet are really who they claim to be

Used for verification, takes a variable-length input and converts it to a fixed-length output string

Used to find the same hash value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm

Operate on plaintext one bit at a time

A structure consisting of programs, protocols, and security policies for encrypting data and uses public key cryptography to protect data transmitted over the Internet

A sequence of random bits generated from a range of allowable values

The use of random data alongside plaintext as an input to a hashing function so that the output is unique

Which function ensures that a sender and receiver Cannot deny sending or receiving a specific message?

Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information. It also cannot deny the authenticity of its signature on a document.

Which of the following is the process of converting ciphertext back into plaintext?

decryption – the process of reverting ciphertext to plaintext (occasionally 'decipherment').

What encryption algorithm is efficient requiring few resources and is based on complex algebra and calculations on curves?

ECC is an efficient algorithm requiring few hardware resources, so it's a perfect candidate for wireless devices and cell phones.

What is an encryption algorithm?

An encryption algorithm is the method used to transform data into ciphertext. An algorithm will use the encryption key in order to alter the data in a predictable way, so that even though the encrypted data will appear random, it can be turned back into plaintext by using the decryption key.