Exam 2: Classical Encryption Techniques

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original alphabet.

(True/False)
4.8/5
(38)

On average,half of all possible keys must be tried to achieve success with a brute-force attack.

(True/False)
4.8/5
(43)

The process of converting from plaintext to ciphertext is known as deciphering or decryption.

(True/False)
4.8/5
(39)

A technique for hiding a secret message within a larger document or picture in such a way that others cannot discern the presence or contents of the hidden message is __________ .

(Essay)
4.8/5
(49)

The task of making large quantities of random keys on a regular basis and distributing a key of equal length to both sender and receiver for every message sent are difficulties of the __________ scheme.

(Essay)
4.8/5
(32)

__________ attacks exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

(Multiple Choice)
4.8/5
(30)

A technique referred to as a __________ is a mapping achieved by performing some sort of permutation on the plaintext letters.

(Multiple Choice)
4.8/5
(35)

The ___________ takes the ciphertext and the secret key and produces the original plaintext.It is essentially the encryption algorithm run in reverse.

(Multiple Choice)
4.8/5
(36)

An encryption scheme is __________ secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext,no matter how much ciphertext is available.

(Essay)
4.7/5
(36)

Restoring the plaintext from the ciphertext is __________ .

(Multiple Choice)
4.8/5
(43)

One of the simplest and best known polyalphabetic ciphers is _________ cipher.In this scheme,the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25.Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a.

(Essay)
4.9/5
(37)

Techniques used for deciphering a message without any knowledge of the enciphering details is ___________ .

(Multiple Choice)
4.7/5
(43)

A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.

(Multiple Choice)
4.7/5
(29)

The algorithm will produce a different output depending on the specific secret key being used at the time.The exact substitutions and transformations performed by the algorithm depend on the key.

(True/False)
4.8/5
(35)

The most widely used cipher is the Data Encryption Standard.

(True/False)
4.9/5
(40)

The two types of attack on an encryption algorithm are cryptanalysis based on properties of the encryption algorithm,and _________ which involves trying all possible keys.

(Essay)
4.9/5
(41)

__________ encryption is a form of cryptosystem in which encryption and decryption are performed using the same key.

(Essay)
4.9/5
(35)

Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using different keys.It is also known as non- conventional encryption.

(True/False)
4.9/5
(29)

Symmetric encryption remains by far the most widely used of the two types of encryption.

(True/False)
4.9/5
(41)

Steganography renders the message unintelligible to outsiders by various transformations of the text.

(True/False)
4.7/5
(21)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)