100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cryptography Final UPDATED Actual Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
05-10-2024
Written in
2024/2025

Cryptography Final UPDATED Actual Exam Questions and CORRECT Answers Cryptology - CORRECT ANSWER- is the study of cryptanalysis and cryptography cryptanalysis is used - CORRECT ANSWER- to find some insecurity in a cryptography scheme CIA Triad - CORRECT ANSWER- Confidentiality, Integrity, Availability

Show more Read less
Institution
Cryptography
Course
Cryptography










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cryptography
Course
Cryptography

Document information

Uploaded on
October 5, 2024
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Cryptography Final UPDATED Actual
Exam Questions and CORRECT Answers
Cryptology - CORRECT ANSWER✔✔- is the study of cryptanalysis and cryptography



cryptanalysis is used - CORRECT ANSWER✔✔- to find some insecurity in a cryptography
scheme


CIA Triad - CORRECT ANSWER✔✔- Confidentiality, Integrity, Availability



According to x.800 the architecture of security is - CORRECT ANSWER✔✔- the three
aspects of information security
a) security attack
b) security mechanism (control)
c) security service


an intelligent threat is called - CORRECT ANSWER✔✔- an attack, a deliberate attempt to
evade security services and violate the security policy of a system.


the passive attack type is: - CORRECT ANSWER✔✔- Release of message contents


protection agains denial by one of the entities involved in a communication (origin,
destination)is called a: - CORRECT ANSWER✔✔- Non-Repudation



Conversion of cypher text to plaintext is - CORRECT ANSWER✔✔- decryption


the information known to a cryptanalyst is known plaintext attack is - CORRECT
ANSWER✔✔- encryption algorithm
cipher text
one or more plaintext-cyphertext pairs formed with secrete key.

,what is the difference between mono alphabetic and poly alphabetic cipher - CORRECT
ANSWER✔✔- The monoalphabetic cipher is a permutation of a finite set of elements S is an
ordered sequence of all the elements of S, with each element appearing exactly once. In
mono- the relationship between cipher text and plain text is one to one.
The polyalphabetic cipher improves on this by using different monoalphabetic substitutions
as one proceeds through the plaintext. The polyalphabetic cipher is more complex. In a poly-
one letter of plain text can be mapped to many letters of cipher text.


the method of Caesar cipher is - CORRECT ANSWER✔✔- substitution



what is the encryption algorithm for Vigenere cipher? - CORRECT ANSWER✔✔- Ci = (pi
+ ki) mod 26


what is the decryption algorithm for vernam cipher? - CORRECT ANSWER✔✔- ci = pi⊕ki
where pi = ith binary digit of plaintext ki = ith binary digit of key ci = ith binary digit of
ciphertext


what is the rail fence transposition technique? - CORRECT ANSWER✔✔- the message is
written in a rectangle, row by row, and read the message off, column by column, but permute
the order of the column, the order of the columns then becomes the key to the algorithm.


give an example for play fair cipher - CORRECT ANSWER✔✔- The keyword is
MONARCHY
Message = Move forward
Plaintext = mo ve fo rw ar dx
mo -> ON; ve -> UF; fo -> PH, etc
Ciphertext = ON UF PH NZ RM BZ


how many rounds does the AES-192 perform? - CORRECT ANSWER✔✔- 12



AES uses a _______ bit block size - CORRECT ANSWER✔✔- 128



the leftmost 4 bits in s-box represents the following value - CORRECT ANSWER✔✔- row

, the number of s-boxes in AES - CORRECT ANSWER✔✔- 1



the number of stages in each round of AES includes - CORRECT ANSWER✔✔- 4



the number of subways in key expansion is - CORRECT ANSWER✔✔- the number of
rounds +1


AES algorithm is derived by - CORRECT ANSWER✔✔- Rijndael



AES is faster then 3DES - CORRECT ANSWER✔✔- true



AES follows Fiestel structure - CORRECT ANSWER✔✔- false



the stages defined in AES encryption are - CORRECT ANSWER✔✔- substitution bytes
shift rows
mixed columns
and add round key


GCD(a,b) is the same as GCD(| a |, | b |) - CORRECT ANSWER✔✔- true


calculate the GCD of 1160718174 and 316258250 using Euclidean algorithm - CORRECT
ANSWER✔✔- 1160718174 = 3(316258250) + 211943424
316258250 = 211943424 + 104314826
211943424 =2(104314826) + 3313772
104314826 = 31(3313772) + 1587894
3313772 =2(1587894 )+ 137984
1587894 =11(137984 )+ 70,070
137984 = 70070 + 67914
70070 = 67914 + 2156

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1067
Member since
1 year
Number of followers
102
Documents
68976
Last sold
18 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

168 reviews

5
73
4
30
3
43
2
8
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions