Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CRY302 Exam Questions and Answers 2023/2024

Beoordeling
-
Verkocht
-
Pagina's
18
Cijfer
A+
Geüpload op
01-02-2024
Geschreven in
2023/2024

CRY302 Exam Questions and Answers 2023/2024 3. An original intelligible message fed into the algorithm as input is known as _________ , while the coded message produced as output is called the __________ . A) decryption, encryption B) plaintext, ciphertext C) deciphering, enciphering D) cipher, plaintext - ANSW B) plaintext, ciphertext 4. Restoring the plaintext from the ciphertext is __________ . A) deciphering B) transposition

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CRY302 Exam Questions and Answers 2023/2024

1. __________ techniques map plaintext elements (characters, bits) into ciphertext
elements.
A) Transposition
B) Substitution
C) Traditional
D) Symmetric - ANSW B) Substitution

2. Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a
random key that is as long as the message so that the key does not need to be
repeated. The key is used to encrypt and decrypt a single message and then is
discarded. Each new message requires a new key of the same
length as the new message. This scheme is known as a(n) __________ .

A) pascaline
B) one-time pad
C) polycipher
D) enigma - ANSW B) one-time pad

3. An original intelligible message fed into the algorithm as input is known as
_________ , while the coded message produced as output is called the __________ .

A) decryption, encryption
B) plaintext, ciphertext
C) deciphering, enciphering
D) cipher, plaintext - ANSW B) plaintext, ciphertext

4. Restoring the plaintext from the ciphertext is __________ .

A) deciphering
B) transposition
C) steganography
D) encryption - ANSW A) deciphering

5. A __________ attack involves trying every possible key until an intelligible translation
of the ciphertext is obtained.

A) brute-force
B) Caesar attack
C) ciphertext only
D) chosen plaintext - ANSW A) brute-force

,6. Techniques used for deciphering a message without any knowledge of the
enciphering details is ___________ .

A) blind deciphering
B) steganography
C) cryptanalysis
D) transposition - ANSW B) steganography

7. The ___________ takes the ciphertext and the secret key and produces the original
plaintext. It is essentially the encryption algorithm run in reverse.

A) Voronoi algorithm
B) decryption algorithm
C) cryptanalysis
D) diagram algorithm - ANSW B) decryption algorithm

8. If both sender and receiver use the same key, the system is referred to as:

A) public-key encryption
B) two-key
C) asymmetric
D) conventional encryption - ANSW D) conventional encryption

9. __________ attacks exploit the characteristics of the algorithm to attempt to deduce
a specific plaintext or to deduce the key being used.

A) Brute-force
B) Cryptanalytic
C) Block cipher
D) Transposition - ANSW B) Cryptanalytic

10. The __________ was used as the standard field system by the British Army in
World War I and was used by the U.S. Army and other Allied forces during World War II.

A) Caesar cipher
B) Playfair cipher
C) Hill cipher
D) Rail Fence cipher - ANSW B) Playfair cipher

11. The __________ attack is the easiest to defend against because the opponent has
the least amount of information to work with.

A) ciphertext-only
B) chosen ciphertext
C) known plaintext
D) chosen plaintext - ANSW A) ciphertext-only

, 12. _________ refer to common two-letter combinations in the English language.

A) Streaming
B) Transposition
C) Digrams
D) Polyalphabetic cipher - ANSW C) Digrams

13. A way to improve on the simple monoalphabetic technique is to use different
monoalphabetic substitutions as one proceeds through the plaintext
message. The general name for this approach is ___________ .

A) rail fence cipher
B) cryptanalysis
C) polyalphabetic substitution cipher
D) polyanalysis cipher - ANSW C) polyalphabetic substitution cipher

14. A technique referred to as a __________ is a mapping achieved by performing
some sort of permutation on the plaintext letters.

A) transposition cipher
B) polyalphabetic cipher
C) Caesar cipher
D) monoalphabetic cipher - ANSW A) transposition cipher

15. The methods of __________ conceal the existence of the message in a graphic
image.

A) steganography
B) decryptology
C) cryptology
D) cryptography - ANSW A) steganography

T F 1. Symmetric encryption remains by far the most widely used of the
two types of encryption. - ANSW T

T F 2. Rotor machines are sophisticated precomputer hardware devices
that use substitution techniques. - ANSW T

T F 3. Symmetric encryption is a form of cryptosystem in which
encryption and decryption are performed using different keys. It is
also known as non- conventional encryption. - ANSW F

T F 4. With the use of symmetric encryption, the principal security
problem is maintaining the secrecy of the key. - ANSW T

Geschreven voor

Vak

Documentinformatie

Geüpload op
1 februari 2024
Aantal pagina's
18
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Certifiedacademics

Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
Certifiedacademics Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
3
Lid sinds
2 jaar
Aantal volgers
1
Documenten
327
Laatst verkocht
2 maanden geleden
Online library

Get all your study sets here from exam elaboration, thesis to homeworks.

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen