Exam 2: Classical Encryption Techniques
Exam 1: Overview45 Questions
Exam 2: Classical Encryption Techniques45 Questions
Exam 3: Block Ciphers and the Data Encryption Standard27 Questions
Exam 4: Basic Concepts in Number Theory and Finite Fields26 Questions
Exam 5: Advanced Encryption Standard45 Questions
Exam 6: Block Cipher Operation44 Questions
Exam 7: Random and Pseudorandom Number45 Questions
Exam 8: More Number Theory45 Questions
Exam 9: Public-Key Cryptography and Rsa45 Questions
Exam 10: Other Public-Key Cryptosystems45 Questions
Exam 11: Cryptographic Hash Functions45 Questions
Exam 12: Message Authentication Codes45 Questions
Exam 13: Digital Signatures45 Questions
Exam 14: Key Management and Distribution45 Questions
Exam 15: User Authentication Protocols45 Questions
Exam 16: Network Access Control and Cloud Security45 Questions
Exam 17: Transport-Level Security26 Questions
Exam 18: Wireless Network Security45 Questions
Exam 19: Electronic Mail Security45 Questions
Exam 20: Ip Security44 Questions
Select questions type
Monoalphabetic ciphers are easy to break because they reflect the frequency data of the original alphabet.
(True/False)
4.8/5
(38)
On average,half of all possible keys must be tried to achieve success with a brute-force attack.
(True/False)
4.8/5
(43)
The process of converting from plaintext to ciphertext is known as deciphering or decryption.
(True/False)
4.8/5
(39)
A technique for hiding a secret message within a larger document or picture in such a way that others cannot discern the presence or contents of the hidden message is __________ .
(Essay)
4.8/5
(49)
The task of making large quantities of random keys on a regular basis and distributing a key of equal length to both sender and receiver for every message sent are difficulties of the __________ scheme.
(Essay)
4.8/5
(32)
__________ attacks exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
(Multiple Choice)
4.8/5
(30)
A technique referred to as a __________ is a mapping achieved by performing some sort of permutation on the plaintext letters.
(Multiple Choice)
4.8/5
(35)
The ___________ takes the ciphertext and the secret key and produces the original plaintext.It is essentially the encryption algorithm run in reverse.
(Multiple Choice)
4.8/5
(36)
An encryption scheme is __________ secure if the ciphertext generated by the scheme does not contain enough information to determine uniquely the corresponding plaintext,no matter how much ciphertext is available.
(Essay)
4.7/5
(36)
Restoring the plaintext from the ciphertext is __________ .
(Multiple Choice)
4.8/5
(43)
One of the simplest and best known polyalphabetic ciphers is _________ cipher.In this scheme,the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25.Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter a.
(Essay)
4.9/5
(37)
Techniques used for deciphering a message without any knowledge of the enciphering details is ___________ .
(Multiple Choice)
4.7/5
(43)
A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.
(Multiple Choice)
4.7/5
(29)
The algorithm will produce a different output depending on the specific secret key being used at the time.The exact substitutions and transformations performed by the algorithm depend on the key.
(True/False)
4.8/5
(35)
The two types of attack on an encryption algorithm are cryptanalysis based on properties of the encryption algorithm,and _________ which involves trying all possible keys.
(Essay)
4.9/5
(41)
__________ encryption is a form of cryptosystem in which encryption and decryption are performed using the same key.
(Essay)
4.9/5
(35)
Symmetric encryption is a form of cryptosystem in which encryption and decryption are performed using different keys.It is also known as non- conventional encryption.
(True/False)
4.9/5
(29)
Symmetric encryption remains by far the most widely used of the two types of encryption.
(True/False)
4.9/5
(41)
Steganography renders the message unintelligible to outsiders by various transformations of the text.
(True/False)
4.7/5
(21)
Showing 21 - 40 of 45
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)