Exam 3: Classical Encryption Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the key.

(True/False)
4.8/5
(32)

the one-time pad has unlimited utility and is useful primarily for high-bandwidth channels requiring low security.

(True/False)
4.7/5
(32)

An encryption scheme is __________ secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext, no matter how much ciphertext is available.

(Short Answer)
4.8/5
(37)

the simplest transposition cipher is the _________ technique, in which the plaintext is written down as a sequence of diagonals and then read off as a sequence of rows.

(Short Answer)
4.9/5
(33)

_________ refer to common two-letter combinations in the English language.

(Multiple Choice)
4.8/5
(36)

As with Playfair, the strength of the Hill cipher is that it completely hides single letter frequencies.

(True/False)
4.9/5
(39)

A technique for hiding a secret message within a larger document or picture in such a way that others cannot discern the presence or contents of the hidden message is __________ .

(Short Answer)
4.8/5
(39)

techniques used for deciphering a message without any knowledge of the enciphering details is ___________ .

(Multiple Choice)
4.8/5
(36)

the __________ was used as the standard field system by the British Army in World War I and was used by the U.S.Army and other Allied forces during World War II.

(Multiple Choice)
4.9/5
(30)

Symmetric encryption remains by far the most widely used of the two types of encryption.

(True/False)
4.8/5
(31)

the task of making large quantities of random keys on a regular basis and distributing a key of equal length to both sender and receiver for every message sent are difficulties of the __________ scheme.

(Short Answer)
4.8/5
(30)

the algorithm will produce a different output depending on the specific secret key being used at the time.the exact substitutions and transformations performed by the algorithm depend on the key.

(True/False)
4.7/5
(31)

__________ attacks exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

(Multiple Choice)
4.9/5
(28)

Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using different keys.It is also known as non-conventional encryption.

(True/False)
4.7/5
(38)

One of the simplest and best known polyalphabetic ciphers is _________ cipher.In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25.Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter A.

(Short Answer)
4.9/5
(31)

All encryption algorithms are based on two general principles: substitution and ____________ .

(Short Answer)
4.9/5
(38)

the earliest known, and simplest use, of a substitution cipher was called the __________ cipher and involved replacing each letter of the alphabet with the letter standing three places further down the alphabet.

(Short Answer)
4.8/5
(26)

the __________ consist of a set of independently rotating cylinders through which electrical pulses can flow.Each cylinder has 26 input pins and 26 output pins with internal wiring that connects each input pin to a unique output pin.

(Short Answer)
4.7/5
(34)

the ___________ takes the ciphertext and the secret key and produces the original plaintext.It is essentially the encryption algorithm run in reverse.

(Multiple Choice)
4.7/5
(44)

A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.

(Multiple Choice)
4.7/5
(30)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)