CNT4406 Network Security
and Cryptography
Midterm/Final Exam Study
Guide Questions with
Solutions 2024.
In the context of a PKI, a(n) ___________ authority operates under the trusted
collaboration of the certificate authority and can be delegated day-to-day
certification functions, such as verifying information about new registrants,
generating end-user keys, revoking certificates, and validating that users possess a
valid certificate. - Answer: registration
The CA periodically distributes a(n) ___________ to all users that identifies all
revoked certificates. - Answer: CRL
, CNT4406 Network Security and Cryptography Midterm/Final Exam
A(n) ___________ or cryptosystem is an encryption method or process
encompassing the algorithm, key(s) or crypto variable(s), and procedures used to
perform encryption and decryption. - Answer: cipher
A ______________ is the information used in conjunction with an algorithm to
create the ciphertext from the plaintext or derive the plaintext from the
ciphertext. - Answer: key
_____________ is the process of converting an original message into a form that
is unreadable to unauthorized individuals. - Answer: Encryption
The process of obtaining the plaintext message from a ciphertext message
without knowing the keys used to perform the encryption is called
______________. - Answer: cryptanalysis
A method of encryption that requires the same secret key to encipher and
decipher the message is known as ___________ encryption. - Answer: symmetric
_____________ is the entire range of values that can possibly be used to
construct an individual key. - Answer: Keyspace
The ________________ cipher simply rearranges the values within a block to
create the ciphertext. - Answer: transposition/permutation