Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Introduction to Cryptography – D334 Shawn C839v5_D334 All-In-One Study Guide

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
29-08-2025
Written in
2025/2026

Introduction to Cryptography – D334 Shawn C839v5_D334 All-In-One Study Guide

Institution
Course

Content preview

1. Changing plaintext into ciphertext

(Should be applied in at rest and in transit): Encryption

2. Changing ciphertext to plaintext: Decryption

3. Encrypt individual files and full disks with options such as

BitLocker and

FileVault: Aescrypt

4. Mapping from our alphabet to a number of cipher

alphabets. Added complexity in early cryptosystems.:

Polyalphabetic

5. Single mapping from our alphabet to a cipher alphabet is

created. Many early cryptosystems.: Mono-Alphabetic

6. Considered un-breakable since it only uses its cipher code

once.: One-Time

Pad

7. Method repeats the random numbers after a given time.

(periodic) They are fast and deterministic.

Useful in producing repeatable set of random numbers.:

Pseudo-Random Num- ber Generators (PRNGs)

,8. Method generates a true random number and uses some

form of random process. One approach is to monitor the

movements of a mouse pointer on a screen or from the

pauses between keystrokes. Overall, the method is gener-

ally slow, especially if it involves human interaction, but is

non-deterministic and aperiodic.: True Random Number

Generators (TRNGs)

9. Cipher cracking methodology that involves identifying

patterns and varia- tions in the probability of codes.



i.e. a three-letter ciphered text combination spotted at the

beginning of a string too often could tip us off that those

three letters correlate the letters THE in the English

alphabet.: Frequency Analysis

10. measures level of unpredictability: Entropy

11. Two common binary to characters encoding methods:

ASCII (8bit value, up to 256 characters)

UTF-16 (16bit values, up to 65,536 characters)

, 12. 8 bit value, up to 256 characters: ASCII

13. 16 bit value, up to 65,536 characters: UTF-16

14. Tamper-evident and intrusion-resistant physical device

that safeguards and manages cryptographic keys and

provides cryptographic processing.: - Hardware Security

Module (HSM)

15. Which encryption is more efficient?: Hardware

16. Dedicated processor that handles hardware-level

encryption; allows the use of full disk encryption on a hard

drive in a manner that minimizes the impact on system

performance.



Contains the encryption keys.: Trusted platform module (TPM)

17. value which only has factors of 1 and itself: Prime Number

18. Determine the likelihood of an event happening, typically

by understanding the chances of how each of the elements

involved in an event interact, and the likelihood of them

Written for

Institution
Course

Document information

Uploaded on
August 29, 2025
Number of pages
27
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Stuviaaa Grand Canyon University
Follow You need to be logged in order to follow users or courses
Sold
809
Member since
4 year
Number of followers
522
Documents
1508
Last sold
1 month ago

4.2

176 reviews

5
113
4
27
3
13
2
5
1
18

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions