Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cryptography (SEC-310-0) QUESTION AND ANSWERS 100%

Beoordeling
-
Verkocht
-
Pagina's
19
Cijfer
A+
Geüpload op
19-04-2022
Geschreven in
2021/2022

Selected Answer: Answers: Asymmetric encryption Symmetric encryption Data integrity algorithms Asymmetric encryption Authentication protocols Question 8 2 out of 2 points The essential elements of any pseudorandom number generator are a and a deterministic algorithm for generating a stream of pseudorandom bits. Selected Answer: Answers: seed value secret key session key seed value stream encryption function Question 9 2 out of 2 points The indicates that the subscriber identified in the certificate has sole control and access to the private key Selected Answer: Answers: Public Key Certificate OAEP Digital Signature Public Key Certificate PKI Question 10 2 out of 2 points The first row of State is not altered; for the second row a 1-byte circular left shift is performed; for the third row a 2-byte circular left shift is performed; and for the fourth row a 3-byte circular left shift is performed. This transformation is called . Selected Answer: Answers: Question 11 ShiftRows AddRoundKey MixColumns Substitute bytes ShiftRows 2 out of 2 points A attack involves trying every possible key until an intelligible translation of the ciphertext is obtained. Selected Answer: Answers: brute-force brute-force Caesar attack ciphertext only chosen plaintext Question 12 2 out of 2 points A public-key encryption scheme has ingredients. Selected Answer: Answers: four six six eight two Question 13 2 out of 2 points is a mechanism or service used to verify the integrity of a message. Selected Answer: Answers: Message authentication Message authentication Data compression Data mapping Message digest Question 14 2 out of 2 points is a security enhancement to the MIME Internet email format standard based on technology from RSA Data Security. Selected Answer: Answers: S/MIME S/MIME SPF DKIM HTTPS Question 15 2 out of 2 points A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is . Selected Answer: Answers: encryption integrity encryption analysis masquerade Question 16 2 out of 2 points The Secure Hash Algorithm design closely models, and is based on, the hash function . Selected Answer: Answers: Question 17 MD4 MD5 FIPS 180 RFC 4634 MD4 2 out of 2 points The protocol enables two users to establish a secret key using a public-key scheme based on discrete logarithms. Selected Answer: Answers: Diffie-Hellman Micali-Schnorr Elgamal-Fraiser Diffie-Hellman Miller-Rabin Question 18 2 out of 2 points Asymmetric encryption is also known as . Selected Answer: Answers: public-key encryption public-key encryption private-key encryption optimal-key encryption secret-key encryption Question 19 2 out of 2 points In the general structure of the AES encryption process the input to the encryption and decryption algorithms is a single block. Selected Answer: Answers: 128-bit 32-bit 64-bit 128-bit 256-bit Question 20 2 out of 2 points The most widely used public-key cryptosystem is . Selected Answer: Answers: RSA optimal asymmetric encryption asymmetric encryption RSA AES Question 21 2 out of 2 points is an open-source, freely available software package for e-mail security which has essentially the same functionality as S/MIME. Selected Answer: PGP Correct Answer: Pretty Good Privacy (PGP) Question 22 2 out of 2 points depend on the running time of the decryption algorithm. Selected Answer: Answers: Timing attacks Mathematical attacks Timing attacks Chosen ciphertext attacks Brute-force attacks Question 23 2 out of 2 points The AES cipher begins and ends with a(n) stage because any other stage,applied at the beginning or end, is reversible without knowledge of the key and would add no security. Selected Answer: Answers: AddRoundKey Substitute bytes AddRoundKey MixColumns ShiftRows Question 24 2 out of 2 points A technique referred to as a is a mapping achieved by performing some sort of permutation on the plaintext letters. Selected Answer: Answers: Transposition cipher Transposition cipher Polyalphabetic cipher Monoalphabetic cipher Caesar cipher Question 25 2 out of 2 points A is an algorithm that requires the use of a secret key. Selected Answer: Answers: MAC DAA SHA GCM MAC Question 26 2 out of 2 points involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect. Selected Answer: Answers: Replay Disruption Replay Service denial Masquerade Question 27 2 out of 2 points Asymmetric encryption can be used for . Selected Answer: Answers: both confidentiality and authentication confidentiality both confidentiality and authentication authentication neither confidentiality and authentication Question 28 2 out of 2 points If a secret key is to be used as a for conventional encryption a single number must be generated. Selected Answer: Answers: session key discrete logarithm prime curve session key primitive root Question 29 2 out of 2 points S/MIME cryptographic algorithms use to specify requirement level. Selected Answer: Answers: SHOULD and MUST CAN and MUST SHOULD and CAN SHOULD and MIGHT SHOULD and MUST Question 30 2 out of 2 points (Extra Credit) Decrypt this cypher-text using Playfair. The key is wildcats. GWQWWOFTITCBPQQGMZAYHFBWASMSBAFVXBOCLMSGARZTFTEHBWASMSHRBU Selected Answer: Correct Answer: FINDING A VIDEO POKER BUG MADE THESE GUYS RICH THEN VEGAS MADE THEM PAY Finding a Video Poker Bug Made These Guys Rich—Then Vegas Made Them Pay Question 31 2 out of 2 points The key exchange protocol is vulnerable to a attack because it does not authenticate the participants. Selected Answer: Answers: man-in-the-middle one-way function time complexity chosen ciphertext man-in-the-middle Question 32 2 out of 2 points "Given a hash function H, with n possible outputs and a specific value H(x), if H is applied to k random inputs, what must be the value of k so that the probability that at least one input y satisfies H(y) = H(x) is 0.5" is a reference to the . Selected Answer: Answers: birthday attack authentication code collision resistant birthday attack big endian Question 33 2 out of 2 points A takes place when one entity pretends to be a different entity. Selected Answer: Answers:

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930
College of Technolo g
y




H

Review Test Submission: Week 4 Midterm Exam


User Ilhan Gocmez

Course Summer 2019 - Cryptography (SEC-310-0) Week
Test 4 Midterm Exam
Started 7/31/19 6:03 PM
Submitted 7/31/19 8:42 PM
Status Completed
Attempt 102 out of 100 points
Score
Time 2 hours, 39 minutes
Elapsed
Instructions Please complete the Midterm Exam. The midterm exam covers the content covered in Weeks 1-4. The Mid-term Exam is open book and consists of short answer and
multiple choice questions. Use the textbook and resources found on this Blackboard course.

ResultsAll Answers, Submitted Answers, Correct Answers Displayed



Question 1
2 out of 2 points

DES exhibits the classic block cipher structure, which consists of a number of identical rounds of processing.

Selected
Feiste
Answer:
l
Answers:
Feiste

l

SAC
Shanno
n
Rendell




Question 2
2 out of 2 points

The was used as the standard field system by the British Army in World War I and was used by the U.S. Army and other Allied forces
during World War II.

Selected
Playfair
Answer:
cipher Caesar
Answers:
cipher
Playfair cipher
Hill cipher
Rail Fence cipher




Question 3 2 out of 2 points

techniques map plaintext elements (characters, bits) into ciphertext elements

Selected
Substituti
Answer:
on
Answers:
Transposition
Traditional
Substituti

on Symmetric




Question 4
2 out of 2 points

https://wilmu.blackboard.com/webapps/assessment/review/review.jsp?
attempt_id=_14490244_1&course_id=_468552_1&content_id=_14043534_1&… 1/10

,8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930
The appeal of is that its designers have been able to prove an exact relationship between the strength of the embedded hash
function and the strength of this form of authentication.


Selected
HMAC
Answer:
MAC
Answers:
HMAC
GMAC
CMAC




https://wilmu.blackboard.com/webapps/assessment/review/review.jsp?
attempt_id=_14490244_1&course_id=_468552_1&content_id=_14043534_1&… 2/10

, 8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930


Question 5
2 out of 2 points

S/MIME provides authentication through the use of .

Selected
digital signatures
Answer:
asymmetric block
Answers:
encryption symmetric
block encryption radix-
64
digital signatures




Question 6
2 out of 2 points

Public-key algorithms are based on .


Selected
mathematical
Answer:
functions permutation
Answers:
mathematical functions

substituti
on
symmetry




Question 7
2 out of 2 points

is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.


Selected
Asymmetric encryption

Answer:
Symmetric

Answers: encryption Data
integrity algorithms

Asymmetric

encryption

Authentication

protocols




Question 8
2 out of 2 points

The essential elements of any pseudorandom number generator are a and a deterministic algorithm for generating a stream of pseudorandom bits.

Selected
seed
Answer:
value secret
Answers:
key session
key
seed value

stream encryption function




Question 9 2 out of 2 points

The indicates that the subscriber identified in the certificate has sole control and access to the private key

Selected Answer: Answers:


https://wilmu.blackboard.com/webapps/assessment/review/review.jsp?
attempt_id=_14490244_1&course_id=_468552_1&content_id=_14043534_1&… 3/10

Geschreven voor

Vak

Documentinformatie

Geüpload op
19 april 2022
Aantal pagina's
19
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$7.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
makish

Maak kennis met de verkoper

Seller avatar
makish Walden University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2
Lid sinds
4 jaar
Aantal volgers
2
Documenten
145
Laatst verkocht
2 jaar geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen