Exam 2: Classical Encryption Techniques
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
Rotor machines are sophisticated precomputer hardware devices that use substitution techniques.
Free
(True/False)
5.0/5
(36)
Correct Answer:
True
The methods of __________ conceal the existence of the message in a graphic image.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
A
A way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext message.The general name for this approach is ___________ .
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
C
An original intelligible message fed into the algorithm as input is known as _________ ,while the coded message produced as output is called the __________ .
(Multiple Choice)
4.7/5
(34)
The earliest known and simplest use of a substitution cipher was called the __________ cipher and involved replacing each letter of the alphabet with the letter standing three places further down the alphabet.
(Essay)
4.8/5
(29)
Ciphertext generated using a computationally secure encryption scheme is impossible for an opponent to decrypt simply because the required information is not there.
(True/False)
4.9/5
(33)
The __________ consist of a set of independently rotating cylinders through which electrical pulses can flow.Each cylinder has 26 input pins and 26 output pins with internal wiring that connects each input pin to a unique output pin.
(Essay)
4.8/5
(34)
An encryption scheme is said to be __________ if the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the information.
(Essay)
4.9/5
(44)
The __________ was used as the standard field system by the British Army in World War I and was used by the U.S.Army and other Allied forces during World War II.
(Multiple Choice)
4.7/5
(28)
A scheme known as a one-time pad is unbreakable because it produces random output that bears no statistical relationship to the plaintext.
(True/False)
4.8/5
(34)
With the use of symmetric encryption,the principal security problem is maintaining the secrecy of the key.
(True/False)
4.8/5
(33)
Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that is as long as the message so that the key does not need to be repeated.The key is used to encrypt and decrypt a single message and then is discarded.Each new message requires a new key of the same length as the new message.This scheme is known as an)__________ .
(Multiple Choice)
4.8/5
(32)
_________ refer to common two-letter combinations in the English language.
(Multiple Choice)
4.8/5
(37)
When using symmetric encryption it is very important to keep the algorithm secret.
(True/False)
4.8/5
(43)
Cryptographic systems are characterized along three independent dimensions: The type of operations used for transforming plaintext to ciphertext;The way in which the plaintext is processed;and __________ .
(Essay)
4.9/5
(30)
A __________ cipher processes the input one block of elements at a time producing an output block for each input block whereas a __________ cipher processes the input elements continuously producing output one element at a time.
(Essay)
4.8/5
(38)
As with Playfair,the strength of the Hill cipher is that it completely hides single letter frequencies.
(True/False)
4.9/5
(28)
All encryption algorithms are based on two general principles: substitution and ____________ .
(Essay)
4.9/5
(38)
The one-time pad has unlimited utility and is useful primarily for high-bandwidth channels requiring low security.
(True/False)
4.7/5
(28)
Showing 1 - 20 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)