100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU COURSE C839 - INTRO TO CRYPTOGRAPHY QUESTIONS AND ANSWERS 2024

Puntuación
-
Vendido
-
Páginas
63
Grado
A+
Subido en
29-09-2024
Escrito en
2024/2025

WGU COURSE C839 - INTRO TO CRYPTOGRAPHY QUESTIONS AND ANSWERS 2024

Institución
WGU COURSE C839 - INTRO TO CRYPTOGRAPHY
Grado
WGU COURSE C839 - INTRO TO CRYPTOGRAPHY











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU COURSE C839 - INTRO TO CRYPTOGRAPHY
Grado
WGU COURSE C839 - INTRO TO CRYPTOGRAPHY

Información del documento

Subido en
29 de septiembre de 2024
Número de páginas
63
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU COURSE C839 - INTRO TO
CRYPTOGRAPHY


An encryption function for fixed-size blocks of data. The current generation has a
block size of 128 bits (16 bytes). - ANSWERS-block cipher



To encrypt with a block cipher, we need a ___________. - ANSWERS-secret key



Don't ever trust a ____________ or ________________. (Kerckhoffs's Principle) -
ANSWERS-secret block cipher; secret algorithm



A protocol for online shopping with a credit card. One of its features is that it
encrypts the credit card number so that an eavesdropper cannot copy it. -
ANSWERS-SET



_______________ is the worst enemy of security, and it almost always comes in
the form of features or options. - ANSWERS-Complexity



______________ is a measure of how many things interact at any one point. If the
effect of an option is limited to a small part of the program, then it cannot
interact with an option whose effect is limited to another part of the program. -
ANSWERS-Complexity

,The original message, m is called the ______________. - ANSWERS-plaintext



The public-key algorithms are used to establish _________, which in turn is used
to encrypt the actual data. This combines the flexibility of public-key cryptography
with the efficiency of symmetric-key cryptography. - ANSWERS-a secret key



Digital signatures are the public-key equivalent of ______________________. -
ANSWERS-message authentication codes



For practical reasons, a PKI is often set up with multiple levels of CAs. There is a
top-level CA, called the ________, which issues certificates on the keys of lower-
level CAs, which in turn certify the user keys. - ANSWERS-root



A ____________________ is what most people mean when talking about
breaking an encryption system. This is the situation in which Alice and Bob are
encrypting their data, and all you as the attacker get to see is the ciphertext.
Trying to decrypt a message if you only know the ciphertext is called a ciphertext-
only attack. This is the most difficult type of attack, because you have the least
amount of information. - ANSWERS-ciphertext-only attack



A ________________ is one in which you know both the plaintext and the
ciphertext. The most obvious goal is to find the decryption key. - ANSWERS-
known-plaintext attack



A known-plaintext attack is more powerful than a ciphertext-only attack.

,A True

B False - ANSWERS-A



A __________________ is any nontrivial method that detects a difference
between the ideal encryption scheme and the actual one. This covers all the
attacks we have discussed so far, as well as any yet-to-be-discovered attacks. -
ANSWERS-distinguishing attack



A ____________________is an attack that depends on the fact that duplicate
values, also called collisions, appear much faster than you would expect. -
ANSWERS-Birthday attack



An __________________ attack is one that tries all possible values for some
target object, like the key. If an attack requires 2^235 steps of work, then this
corresponds to an exhaustive search for a 235-bit value. - ANSWERS-exhaustive
search



First introduced by Eli Biham in 1993, a ___________ attack assumes that the
attacker has access to several encryption functions. These functions all have an
unknown key, but their keys have a relationship that the attacker knows. -
ANSWERS-related-key



A _____________ cipher is one for which no attack exists. - ANSWERS-secure
block

, An attack on a block cipher is a non-generic method of distinguishing the block
cipher from an ______________ cipher. - ANSWERS-ideal block



Most modern block ciphers have a ________ block size, but they operate on 32-
bit words. - ANSWERS-128-bit



An _____________ cipher implements an independently chosen random even
permutation for each of the key values. - ANSWERS-ideal block



The simplest method to encrypt a longer plaintext is known as the
_______________________. It has serious weakness, therefore, do not use this
method. - ANSWERS-electronic codebook mode (ECB)



_____________________ was a cylinder tool used by the Greeks, and is often
specifically attributed to the Spartans. It was a physical cylinder that was used to
encrypt messages. Turning the cylinder produced different ciphertexts. While it is
not clear exactly how old this cipher is, it was first mentioned in the 7th century
BC by the Greek poet Archilochus. The recipient uses a rod of the same diameter
as the one used to create the message. He then wraps the parchment to read the
message. To encrypt, one simply writes across the leather. - ANSWERS-Scytale



What type of encryption uses different keys to encrypt and decrypt the message?



A Symmetric

B Private key
$18.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Thumbnail
Package deal
WGU C839 EXAM BUNDLE DEAL
-
5 2024
$ 81.95 Más información

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Teacher101 Teachme2-tutor
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
395
Miembro desde
1 año
Número de seguidores
71
Documentos
9273
Última venta
22 horas hace

Quality is my middle name.....100% ...my policy is to create and nurture people of quality by continuous education and training.....i guaranteed good grades 100% Feel free to get in touch through inbox...anything regarding help or issue with the exams posted... Finally after purchase please leave a good rating if satisfied with my work.... All the best as we continue working to improve ourselves through education

4.6

265 reseñas

5
217
4
14
3
24
2
3
1
7

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes