Exam 2: Cryptographic Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and __________ attacks.

(Short Answer)
4.8/5
(29)

The purpose of a __________ is to produce a "fingerprint" of a file,message,or other block of data.

(Multiple Choice)
4.9/5
(35)

A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.

(Short Answer)
4.9/5
(32)

Transmitted data stored locally are referred to as __________ .

(Multiple Choice)
4.7/5
(29)

Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits.

(True/False)
4.8/5
(29)
Showing 41 - 45 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)