Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Introduction to Cryptography - D334 Exam Questions With Correct Answers

Beoordeling
-
Verkocht
-
Pagina's
39
Cijfer
A+
Geüpload op
14-04-2026
Geschreven in
2025/2026

Introduction to Cryptography - D334 Exam Questions With Correct Answers

Instelling
WGU D334
Vak
WGU D334

Voorbeeld van de inhoud

Introduction to Cryptography - D334 Exam
Questions With Correct Answers


XOR the following
| | |




0101110101010111
1001100000111010
------------------ - CORRECT ANSWER✔✔-1100010101101101
| | |




asymmetric key-based encryption | |




-typical methods - CORRECT ANSWER✔✔-RSA
| | | |




DSA
El Gamal
|




Symmetric key-based encryption | |




-Typical Methods - CORRECT ANSWER✔✔-RC2- 40 bit key size 64 bit block
| | | | | | | | | | |




RC4- (Stream Cipher)- Used in SSL and WEP
| | | | | | |




RC5- (Variable Key size, 32, 64, or 128 bit block size)
| | | | | | | | | |




AES- (128, 192 or 256 bit key size, 128 bit block size)
| | | | | | | | | | |




DES- (56 bit key size. 64 bit Block size)
| | | | | | | |




3DES- (112 bit key size, 64 bit block size)
| | | | | | | |




Block Encryption - CORRECT ANSWER✔✔-RC2(40 bit key size)
| | | | | | | |

,RC5(Variable block size) | |




IDEA
DES
3DES
AES (Rijndael)
|




Blowfish
twofish


stream encryption - CORRECT ANSWER✔✔-RC4
| | | |




Chacha


Rainbow Attack - CORRECT ANSWER✔✔-The method of knowing the mapping
| | | | | | | | | |


between the hashed values and the original data
| | | | | | |




Dictionary-type attack - CORRECT ANSWER✔✔-a brute force analysis
| | | | | | |




∉ - CORRECT ANSWER✔✔-does not belong to
| | | | | |




when an object is not in a set
| | | | | | |




∈ - CORRECT ANSWER✔✔-Belongs to
| | | |




when an object is within a set
| | | | | |




⊆ - CORRECT ANSWER✔✔-subset
| | |




subset has fewer elements or equal to the set
| | | | | | | |

,A ∪ B - CORRECT ANSWER✔✔-union (objects that belong to set A or set B)
| | | | | | | | | | | | | |




| - CORRECT ANSWER✔✔-such that
| | | |




A ∩ B - CORRECT ANSWER✔✔-Intersection: in both A and B
| | | | | | | | | |




Enigma Machine -Cypher 10 - CORRECT ANSWER✔✔-Used a polyalphabetic
| | | | | | | | |


substitution cipher, which did not repeat within a reasonable time period, along
| | | | | | | | | | | |


with a secret key. For the cracking of the Enigma cipher, the challenge was thus to
| | | | | | | | | | | | | | |


determine both the algorithm used and the key. Enigma's main weakness,
| | | | | | | | | | | |


though, was that none of the plain text letters could be ciphered as itself.
| | | | | | | | | | | | |




Four-square cipher9 - CORRECT ANSWER✔✔-Uses four 5 × 5 matrices arranged in
| | | | | | | | | | |


a square, are where each matrix contains 25 letters for encoding and decoding
| | | | | | | | | | | | | |


operations.


One-time pad cypher8 - CORRECT ANSWER✔✔-Cypher Code mapping that is only
| | | | | | | | | |


used once.
| | |




Advantage: it is essentially unbreakable. | | | | |




Disadvantage: it takes lots of work as you would have to generate the pad to be | | | | | | | | | | | | | | | |


used, each time. | |




Vigenere Cipher 7 - CORRECT ANSWER✔✔-Polyalphabetic cipher that involves
| | | | | | | | |


using a different mapping, based on a keyword, for each character of the cipher.
| | | | | | | | | | | | | |


An advantage of this type of cipher is that the same plaintext character is likely to
| | | | | | | | | | | | | | |

, be coded to different mappings, depending on the position of the keyword,
| | | | | | | | | | | | |


making guessing more difficult. | | |




Ceasar Cipher6 - CORRECT ANSWER✔✔-Mono-alphabetic substitution cipher
| | | | | | |


known as "shift" cipher. Involves plaintext being replaced by a letter some fixed
| | | | | | | | | | | | |


number of positions down the alphabet. i.e., a Caesar Cipher using a shift of +3
| | | | | | | | | | | | | | |


would mean a plaintext letter A would result in a ciphertext letter D (a shift of
| | | | | | | | | | | | | | | |


three positions to the right in the alphabet)
| | | | | | |




Morse Code cipher 5 - CORRECT ANSWER✔✔-Encoding method, rather than a
| | | | | | | | | | |


cipher, that works by translating characters into sequences of dots (.) and dashes
| | | | | | | | | | | | |


(-)


Playfair Cipher 4 - CORRECT ANSWER✔✔-5 × 5 matrix containing the alphabet
| | | | | | | | | | | |


less the letter J. Cipher/decipher process consists of a set of rules outlining use of
| | | | | | | | | | | | | | |


column and row combinations. | | |




BIFID Cipher 3 - CORRECT ANSWER✔✔-Makes use of a grid and which maps the
| | | | | | | | | | | | | |


letters into numeric values.| | |




Rail Code Cipher 2 - CORRECT ANSWER✔✔-Employs a method to scramble text
| | | | | | | | | | | |


by writing it in a sequence across a number of rails.
| | | | | | | | | |




Pig Pen Cipher 1 - CORRECT ANSWER✔✔-Mono- alphabetic substitution cipher
| | | | | | | | | |


that makes use of mapping plaintext characters to graphical characters rather
| | | | | | | | | | |


than to alphabetic ones. i.e. A=(pick a symbol), vs A=(pick a letter). Disadvantage:
| | | | | | | | | | | | |


once the mapping is known, it is difficult to keep the message secret.
| | | | | | | | | | | |

Geschreven voor

Instelling
WGU D334
Vak
WGU D334

Documentinformatie

Geüpload op
14 april 2026
Aantal pagina's
39
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$17.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Lectphilip West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
238
Lid sinds
1 jaar
Aantal volgers
6
Documenten
23073
Laatst verkocht
4 dagen geleden
WELCOME TO LECTPHILIP, A PLACE WHERE WE UNLOCK YOUR ACADEMIC OPPORTUNITIES

On this page, you find all documents, package deals and flashcards offered by seller lectphilip

4.0

41 beoordelingen

5
20
4
8
3
9
2
2
1
2

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen