Exam 3: Classical Encryption Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext Message.the general name for this approach is ___________ .

Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
Verified

C

__________ techniques map plaintext elements (characters, bits) into ciphertext elements.

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

B

the two types of attack on an encryption algorithm are cryptanalysis, based on properties of the encryption algorithm, and _________ which involves trying all possible keys.

Free
(Short Answer)
4.7/5
(29)
Correct Answer:
Verified

brute-force

Restoring the plaintext from the ciphertext is __________ .

(Multiple Choice)
4.8/5
(35)

Rotor machines are sophisticated precomputer hardware devices that use substitution techniques.

(True/False)
4.8/5
(34)

the __________ attack is the easiest to defend against because the opponent has the least amount of information to work with.

(Multiple Choice)
4.9/5
(29)

the best known multiple letter encryption cipher is the __________ , which treats digrams in the plaintext as single units and translates these units into ciphertext digrams.

(Short Answer)
4.8/5
(37)

An encryption scheme is said to be __________ if the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the information.

(Short Answer)
4.8/5
(32)

A scheme known as a one-time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext.

(True/False)
4.8/5
(32)

A technique referred to as a __________ is a mapping achieved by performing some sort of permutation on the plaintext letters.

(Multiple Choice)
4.7/5
(33)

__________ encryption is a form of cryptosystem in which encryption and decryption are performed using the same key.

(Short Answer)
4.8/5
(36)

the most widely used cipher ever is the __________ .

(Short Answer)
4.9/5
(34)

Ciphertext generated using a computationally secure encryption scheme is impossible for an opponent to decrypt simply because the required information is not there.

(True/False)
4.9/5
(30)

Cryptographic systems are characterized along three independent dimensions: the type of operations used for transforming plaintext to ciphertext; the way in which the plaintext is processed; and __________ .

(Short Answer)
4.7/5
(32)

An original intelligible message fed into the algorithm as input is known as _________ , while the coded message produced as output is called the __________ .

(Multiple Choice)
4.8/5
(29)

Steganography renders the message unintelligible to outsiders by various transformations of the text.

(True/False)
4.8/5
(37)

the methods of __________ conceal the existence of the message in a graphic image.

(Multiple Choice)
4.8/5
(32)

When using symmetric encryption it is very important to keep the algorithm secret.

(True/False)
4.7/5
(41)

Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original alphabet.

(True/False)
4.9/5
(39)

A __________ cipher processes the input one block of elements at a time, producing an output block for each input block, whereas a stream cipher processes the input elements continuously, producing output one element at a time.

(Short Answer)
4.8/5
(35)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)