Exam 3: Classical Encryption Techniques
Exam 1: Computer and Network Security Concepts45 Questions
Exam 2: Introduction to Number Theory13 Questions
Exam 3: Classical Encryption Techniques45 Questions
Exam 6: Advanced Encryption Standard45 Questions
Exam 7: Block Cipher Operation45 Questions
Exam 8: Random Bit Generation and Stream Ciphers45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Lightweight Cryptography and Post-Quantum Cryptography45 Questions
Exam 15: Cryptographic Key Management and Distribution45 Questions
Exam 16: User Authentication45 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Exam 21: Network Endpoint Security45 Questions
Exam 22: Cloud Security44 Questions
Exam 23: Internet of Things Iot Security45 Questions
Select questions type
With the use of symmetric encryption, the principal security
problem is maintaining the secrecy of the key.
(True/False)
4.8/5
(32)
the one-time pad has unlimited utility and is useful primarily for
high-bandwidth channels requiring low security.
(True/False)
4.7/5
(32)
An encryption scheme is __________ secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext, no matter how much ciphertext is available.
(Short Answer)
4.8/5
(37)
the simplest transposition cipher is the _________ technique, in which the plaintext is written down as a sequence of diagonals and then read off as a sequence of rows.
(Short Answer)
4.9/5
(33)
_________ refer to common two-letter combinations in the English language.
(Multiple Choice)
4.8/5
(36)
As with Playfair, the strength of the Hill cipher is that it
completely hides single letter frequencies.
(True/False)
4.9/5
(39)
A technique for hiding a secret message within a larger document or picture in such a way that others cannot discern the presence or contents of the hidden message is __________ .
(Short Answer)
4.8/5
(39)
techniques used for deciphering a message without any knowledge of the enciphering details is ___________ .
(Multiple Choice)
4.8/5
(36)
the __________ was used as the standard field system by the British Army in World War I and was used by the U.S.Army and other Allied forces during World War II.
(Multiple Choice)
4.9/5
(30)
Symmetric encryption remains by far the most widely used of the
two types of encryption.
(True/False)
4.8/5
(31)
the task of making large quantities of random keys on a regular basis and distributing a key of equal length to both sender and receiver for every message sent are difficulties of the __________ scheme.
(Short Answer)
4.8/5
(30)
the algorithm will produce a different output depending on the
specific secret key being used at the time.the exact substitutions
and transformations performed by the algorithm depend on the
key.
(True/False)
4.7/5
(31)
__________ attacks exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
(Multiple Choice)
4.9/5
(28)
Symmetric encryption is a form of cryptosystem in which
encryption and decryption are performed using different keys.It is
also known as non-conventional encryption.
(True/False)
4.7/5
(38)
One of the simplest and best known polyalphabetic ciphers is _________ cipher.In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25.Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter
A.
(Short Answer)
4.9/5
(31)
All encryption algorithms are based on two general principles: substitution and
____________ .
(Short Answer)
4.9/5
(38)
the earliest known, and simplest use, of a substitution cipher was called the __________ cipher and involved replacing each letter of the alphabet with the letter standing three places further down the alphabet.
(Short Answer)
4.8/5
(26)
the __________ consist of a set of independently rotating cylinders through which
electrical pulses can flow.Each cylinder has 26 input pins and 26 output pins with internal wiring that connects each input pin to a unique output pin.
(Short Answer)
4.7/5
(34)
the ___________ takes the ciphertext and the secret key and produces the original plaintext.It is essentially the encryption algorithm run in reverse.
(Multiple Choice)
4.7/5
(44)
A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.
(Multiple Choice)
4.7/5
(30)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)