Exam 3: Classical Encryption Techniques
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
A way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext
Message.the general name for this approach is ___________ .
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
C
__________ techniques map plaintext elements (characters, bits) into ciphertext elements.
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
B
the two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.
Free
(Short Answer)
4.7/5
(29)
Correct Answer:
brute-force
Rotor machines are sophisticated precomputer hardware devices
that use substitution techniques.
(True/False)
4.8/5
(34)
the __________ attack is the easiest to defend against because the opponent has the least amount of information to work with.
(Multiple Choice)
4.9/5
(29)
the best known multiple letter encryption cipher is the __________ , which treats digrams in the plaintext as single units and translates these units into ciphertext digrams.
(Short Answer)
4.8/5
(37)
An encryption scheme is said to be __________ if the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the information.
(Short Answer)
4.8/5
(32)
A scheme known as a one-time pad is unbreakable because it
produces random output that bears no statistical relationship to
the plaintext.
(True/False)
4.8/5
(32)
A technique referred to as a __________ is a mapping achieved by performing some sort of permutation on the plaintext letters.
(Multiple Choice)
4.7/5
(33)
__________ encryption is a form of cryptosystem in which encryption and decryption are performed using the same key.
(Short Answer)
4.8/5
(36)
Ciphertext generated using a computationally secure encryption
scheme is impossible for an opponent to decrypt simply because
the required information is not there.
(True/False)
4.9/5
(30)
Cryptographic systems are characterized along three independent dimensions: the type of operations used for transforming plaintext to ciphertext; the way in which the plaintext is processed; and __________ .
(Short Answer)
4.7/5
(32)
An original intelligible message fed into the algorithm as input is known as _________ , while the coded message produced as output is called the __________ .
(Multiple Choice)
4.8/5
(29)
Steganography renders the message unintelligible to outsiders by
various transformations of the text.
(True/False)
4.8/5
(37)
the methods of __________ conceal the existence of the message in a graphic image.
(Multiple Choice)
4.8/5
(32)
When using symmetric encryption it is very important to keep the
algorithm secret.
(True/False)
4.7/5
(41)
Monoalphabetic ciphers are easy to break because they reflect the
frequency data of the original alphabet.
(True/False)
4.9/5
(39)
A __________ cipher processes the input one block of elements at a time, producing an output block for each input block, whereas a stream cipher processes the input
elements continuously, producing output one element at a time.
(Short Answer)
4.8/5
(35)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)