100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Introduction to Cryptography - D334 Final Exam Questions And Answers(Revised).

Beoordeling
3.5
(2)
Verkocht
12
Pagina's
27
Cijfer
A+
Geüpload op
23-08-2024
Geschreven in
2024/2025

XOR the following ------------------ - Answer asymmetric key-based encryption -typical methods - Answer RSA DSA El Gamal Symmetric key-based encryption -Typical Methods - Answer RC2- 40 bit key size 64 bit block RC4- (Stream Cipher)- Used in SSL and WEP RC5- (Variable Key size, 32, 64, or 128 bit block size) AES- (128, 192 or 256 bit key size, 128 bit block size) DES- (56 bit key size. 64 bit Block size) 3DES- (112 bit key size, 64 bit block size) Block Encryption - Answer RC2(40 bit key size) RC5(Variable block size) IDEA DES 3DES AES (Rijndael)

Meer zien Lees minder
Instelling
WGU D334
Vak
WGU D334










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
WGU D334
Vak
WGU D334

Documentinformatie

Geüpload op
23 augustus 2024
Aantal pagina's
27
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Voorbeeld van de inhoud

Introduction to Cryptography - D334
Final Exam Questions And
Answers(Revised).
XOR the following

0101110101010111

1001100000111010

------------------ - Answer 1100010101101101



asymmetric key-based encryption

-typical methods - Answer RSA

DSA

El Gamal



Symmetric key-based encryption

-Typical Methods - Answer RC2- 40 bit key size 64 bit block

RC4- (Stream Cipher)- Used in SSL and WEP

RC5- (Variable Key size, 32, 64, or 128 bit block size)

AES- (128, 192 or 256 bit key size, 128 bit block size)

DES- (56 bit key size. 64 bit Block size)

3DES- (112 bit key size, 64 bit block size)



Block Encryption - Answer RC2(40 bit key size)

RC5(Variable block size)

IDEA

DES

3DES

AES (Rijndael)

,Blowfish

twofish



stream encryption - Answer RC4

Chacha



Rainbow Attack - Answer The method of knowing the mapping between the hashed values and the
original data



Dictionary-type attack - Answer a brute force analysis



∉ - Answer does not belong to

when an object is not in a set



∈ - Answer Belongs to

when an object is within a set



⊆ - Answer subset

subset has fewer elements or equal to the set



A ∪ B - Answer union (objects that belong to set A or set B)



| - Answer such that



A ∩ B - Answer Intersection: in both A and B



Enigma Machine -Cypher 10 - Answer Used a polyalphabetic substitution cipher, which did not repeat
within a reasonable time period, along with a secret key. For the cracking of the Enigma cipher, the
challenge was thus to determine both the algorithm used and the key. Enigma's main weakness, though,
was that none of the plain text letters could be ciphered as itself.

, Four-square cipher9 - Answer Uses four 5 × 5 matrices arranged in a square, are where each matrix
contains 25 letters for encoding and decoding operations.



One-time pad cypher8 - Answer Cypher Code mapping that is only used once.

Advantage: it is essentially unbreakable.

Disadvantage: it takes lots of work as you would have to generate the pad to be used, each time.



Vigenere Cipher 7 - Answer Polyalphabetic cipher that involves using a different mapping, based on a
keyword, for each character of the cipher. An advantage of this type of cipher is that the same plaintext
character is likely to be coded to different mappings, depending on the position of the keyword, making
guessing more difficult.



Ceasar Cipher6 - Answer Mono-alphabetic substitution cipher known as "shift" cipher. Involves
plaintext being replaced by a letter some fixed number of positions down the alphabet. i.e., a Caesar
Cipher using a shift of +3 would mean a plaintext letter A would result in a ciphertext letter D (a shift of
three positions to the right in the alphabet)



Morse Code cipher 5 - Answer Encoding method, rather than a cipher, that works by translating
characters into sequences of dots (.) and dashes (-)



Playfair Cipher 4 - Answer 5 × 5 matrix containing the alphabet less the letter J. Cipher/decipher
process consists of a set of rules outlining use of column and row combinations.



BIFID Cipher 3 - Answer Makes use of a grid and which maps the letters into numeric values.



Rail Code Cipher 2 - Answer Employs a method to scramble text by writing it in a sequence across a
number of rails.



Pig Pen Cipher 1 - Answer Mono- alphabetic substitution cipher that makes use of mapping plaintext
characters to graphical characters rather than to alphabetic ones. i.e. A=(pick a symbol), vs A=(pick a
letter). Disadvantage: once the mapping is known, it is difficult to keep the message secret.

Beoordelingen van geverifieerde kopers

Alle 2 reviews worden weergegeven
8 maanden geleden

10 maanden geleden

10 maanden geleden

Thank you For The 5 Star Review Wishing you all the best in your exams And Welcome For More Learning Materials.

3.5

2 beoordelingen

5
1
4
0
3
0
2
1
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
COCOSOLUTIONS Nursing
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
132
Lid sinds
1 jaar
Aantal volgers
16
Documenten
6481
Laatst verkocht
2 uur geleden
COCO SOLUTIONS ACADEMIC STORE

COCO SOLUTIONS ACADEMIC STORE YOU GET ALL KIND OF EXAMS,STUDYGUIDES,ASSIGNMENTS,FLASHCARDS,NOTES,SUMMARIES,REVIEWS .ALL YOUR ACADEMIC SOLUTIONS WE GOT YOU COVERED.WE ARE YOUR STUDY SOLUTION ,MAKING YOUR EDUCATION JOURNEY SMOOTH AND EFFICIENT FOR MORE ENQUIRIES FEEL FREE TO REACH US OUT.

4.2

21 beoordelingen

5
12
4
4
3
3
2
1
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen