Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGUC839 Introduction to Cryptography Actual Exam 100% Correct Answer

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
27-09-2023
Written in
2023/2024

WGUC839 Introduction to Cryptography Actual Exam 100% Correct Answer WGUC839 Introduction to Cryptography Actual Exam 100% Correct Answer WGUC839 Introduction to Cryptography Actual Exam 100% Correct Answer WGUC839 Introduction to Cryptography Actual Exam 100% Correct Answer

Show more Read less
Institution
Course

Content preview

WGUC839 Introduction to Cryptography Actual Exam 100% Correct Answer

1. Serpent: Symmetric Block Cipher
Block Size: 128 bits
Key Size: 128, 192, or 256 bits
Rounds: 32
Network: Substitution-Permutation
2. Tiny Encryption Algorithm (TEA): Symmetric Block Cipher
Block Size: 64 bits
Key Size: 128 bits
3. Cryptography: Deciphering secret writings, kryptos means hidden and grafo
means write. Must not be readable by interlopers over secure/hidden communica-
tions. Readable by intended recipients only.
4. Mono-Alphabet Substitution Algorithms: Include Ceasar, Atbash, Affine and
ROT13
5. Caeser Cipher: Is one of the oldest methods, was used by ancient Romans. Shift
of letter. Easy to crack to common words like "A" and "The".
6. Single Substitution Weakness: Using common words (A, THE, OO, EE) in
English Lang to brute force single substitution ciphers.
7. Null Cipher: Hidden message in unrelated text

• The sender and recipient have prearranged to use some pattern, taking certain
letters from the message.
8. Book Cipher: Parties agree on a particular book. Simplest implementation to
send coordinates for words
9. Rail Fence Cipher: Widely known Transposition cipher. Plaintext written in
columns and transposed in rows. Recipient reconstructs the original message
10. Symmetric Key Cryptography uses two processes: Substitution (XOR the
PT with key) and transposition (swapping blocks of text)
11. DES (Data Encryption Standard): Symmetric Block Cipher
Block Size: 64 bit
Key Size: 56 bit
Rounds: 16 rounds

Feistel cipher
12. Initialization Vector (IV): Fixed sizes of random or pseudorandom, non repeat-
ing nonce
13. AES (Advance Encryption Standard): Symmetric Block Cipher
Block Size: 128 bits
Key Size: 128, 192 256 bits
Rounds: 10, 12, 14


,WGUC839 Introduction to Cryptography Actual Exam 100% Correct Answer


Network: Substitution Permutation
14. IDEA (International Data Encryption Algorithm): Symmetric Block Cipher
Block Size: 64 bits
Key Size: 128 bits
15. CAST 128/256: Symmetric Block Cipher
Block Size: 64 bit blocks
Key Size: 40 to 128 bits

Two versions: 128 and 256
16. Electronic Codebook (ECB): Each block is encrypted independently but iden-
tical plaintext blocks are encrypted into identical ciphertext blocks

IV is used on the first block
17. Cipher Block Chaining (CBC): Each block of plaintext is XORed with the with
the previous ciphertext block before being encrypted

IV is used on the first block
18. Propagating Cipher Block Chaining (PCBC): Each block of PT is XORed with
the XOR of the previous PT block AND the previous CT block before being encrypted
19. Cipher Feedback (CFB) Mode: Allows encryption of partial blocks
20. Output Feedback (OFB): Generates keystream blocks that are XORed with the
PT blocks

Turns block Cipher to stream Cipher
21. Counter (CTR): Turns block cipher into stream cipher like OFB,

It generates the next keystream block by encrypting successive values of a counter
22. Co-Prime Numbers: Is a number that has no factors in common with another
number
23. FISH (FIbonacci Shrinking): Software based stream cipher

Vulnerable to known plaintext attacks.
24. Hash Salt: Random bits that are used as one of the input to the hash.
25. MD5 (Message Digest 5): Hashing Algorithm
Hash Size: 128 Bits
Block Processing: 512 Bits
specified by RFC 1321



,WGUC839 Introduction to Cryptography Actual Exam 100% Correct Answer

The length of the message (before padding) is then appended as the last 64 bits of
the message
26. SHA (Secure Hash Algorithm): • SHA-1 160 bit hash function similar to MD5.
Designed by NSA

• SHA-2 Consists of SHA 224, 256, 384, and 512. They differ in word sizes but 512
bit blocks

• SHA-3 still in development. Should be complete by NIST by 2012.
27. FORK-256: • Uses 512-bit blocks

• Each block is hashed into 256 bit blocks in parallel.

• Still under review and not widespread.
28. RIPEMD-160 (RACE Integrity Primitives Evaluation Message Digest): Has
128, 256 and 320 bit versions. More secure than MD5
29. Tiger: 192 bit hash function

Collision resistant design
30. MAC and HMAC: Add a key to the has to improve integrity. Uses block cipher in
CBC and salt
31. Asymmetric Cryptography: • Also called Public Key Cryptography

• Uses key pairs which consist of a public key and private key

• The public key is made public and the private key is kept secret

• The public key is used to encrypt messages and only the recipient's private key
can decrypt them
32. Types of Random Number Generators: Table Look Up
Hardware
Software
33. Eulers Totient: Counts the positive integers up to a given integer n that are
co-prime to n
34. Birthday Theorem/Paradox: You need approximately 1.174 N to have a high
probability of a collision.
35. Fortuna: A group of PRNGs

Uses a seed file.

Written for

Course

Document information

Uploaded on
September 27, 2023
Number of pages
18
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$19.09
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
ERICPinchus Walden University
Follow You need to be logged in order to follow users or courses
Sold
159
Member since
3 year
Number of followers
85
Documents
2415
Last sold
2 weeks ago
Perfect Expert Scores

Welcome to my all inclusive store. Get all quality study materials at a cost-effective price. Hello! I'm Prof Eric, and I specialize in a diverse range of subjects including Health Care, Nursing, History, Mathematics, Psychology, and Biology. With a commitment to academic excellence, my work includes meticulously updated exam solutions and study materials designed to help you succeed. Why Choose My Documents: 1.Expertise Across Disciplines: Whether you need help with complex biology concepts, nursing fundamentals, historical analysis, mathematical problems, psychological theories, or healthcare insights, I've got you covered. 2.Updated Exam Solutions: My materials are regularly refreshed to ensure you have the most current and relevant information for your exams. 3.Detailed and Clear: Each document is crafted with precision to provide clarity and ease of understanding, making your study sessions more productive. Welcome to my all inclusive store.Get all quality study materials at a cost-effective price EXCELLENT HOMEWORK HELP AND TUTORING ,ALL KIND OF QUIZ AND EXAMS WITH GUARANTEE OF A. I ensure scholarly standards in my documents and that's why i'm one of the BEST GOLD RATED TUTORS in Stuvia. I assure a GOOD GRADE if you will use my work.

Read more Read less
4.6

317 reviews

5
223
4
65
3
20
2
5
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions