100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Chapter 8 - Cryptography Exam Questions with Answers.

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
29-03-2025
Written in
2024/2025

Chapter 8 - Cryptography Exam Questions with Answers Cryptology - Correct Answers: science of encryption: combines cryptography and cryptanalysis. Encryption - Correct Answers: The process of converting an original message into a form that is unreadable by unauthorized individuals. Cryptography - Correct Answers: process of making and using codes to secure transmission of info. Cryptanalysis - Correct Answers: process of obtaining original message from encrypted message without knowing algorithms. Decryption - Correct Answers: the process of converting the ciphertext message back into plaintext so it can be readily understood. Key - Correct Answers: - the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext. - this can be a series of bits used by a computer program, or it can be a passphrase used by humans. Algorithm - Correct Answers: - A set of steps or mathematical calculations used in solving a problem - In cryptography, it is the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message, or the programs that enable the cryptographic processes. Foundations of Cryptology: - Correct Answers: - cryptology has a long and multicultural history With emergence of technology; need for ______________ in information technology environment greatly increased. - Correct Answers: encryption All popular web browsers use built-in encryption features for __________ e-commerce applications. - Correct Answers: secure Plaintext can be encrypted through two methods: - Correct Answers: 1. bit stream 2. block cipher Bit Stream Method: - Correct Answers: each bit in the plaintext is transformed into a cipher bit one bit at a time. Block Cipher Method: - Correct Answers: the message is divided into blocks, and then each block of plaintext bits is transformed into an encrypted block of cipher bits using an algorithm and key. Substitution Cipher - Correct Answers: - substitute one value for another Monoalphabetic substitution: - Correct Answers: uses only one alphabet Polyalphabetic substitution: - Correct Answers: more advanced; uses two or more alphabets. Vigenère cipher - Correct Answers: advanced cipher type that uses simple polyalphabetic code; made up of 26 distinct cipher alphabets. Transposition cipher - Correct Answers: - easy to understand, but if properly used, produces ciphertext that is difficult to decipher. - rearranges values within a block to create ciphertext - to make the encryption even stronger, the keys and block sizes can be made much larger. Transportation cipher can be done at the _____ level or at the byte (character) level. - Correct Answers: bit Exclusive OR - Correct Answers: a function of Boolean algebra ; two bits are compared If two bits are identical , the result is binary _____. - Correct Answers: 0 If two bits are not identical, result is binary ____. - Correct Answers: 1 XOR ___________ is a very simple symmetric cipher that is used in many applications where security is NOT a defined requirement. - Correct Answers: encryption What company developed the Vernam Cipher - Correct Answers: AT&T Vernam Cipher - Correct Answers: - uses set of characters once per encryption process In ________ cipher, each character of the plaintext is turned into a number, and a pad value for that position is added. - Correct Answers: Vernam Book or Running Key Cipher - Correct Answers: - uses text in book as key to decrypt a message. Ciphertext contains codes representing page, line, and ________ ______________. - Correct Answers: word numbers Algorithm is the mechanical process of : - Correct Answers: - looking up references from the ciphertext - converting each reference to a word by using the cipher texts value and the key. What are the typical sources in "Book or Running Key Cipher" ? - Correct Answers: - thesaurus - dictionaries Hash Functions: - Correct Answers: - mathematical algorithms that generate message summary/digest to confirm message identity and confirm no context has changed. - use of keys not required Hash Algorithms: - Correct Answers: publicly known functions that create hash value. Cryptographic Algorithms are often grouped into two broad categories: - Correct Answers: - symmetric and asymmetric. Todays popular cryptosystems use a ______ combo of symmetric and asymmetric algorithms. - Correct Answers: hybrid Symmetric and asymmetric algorithms are distinguished by the types of ______ they use for encryption and decryption operations. - Correct Answers: keys Symmetric Encryption - Correct Answers: uses same "secret key" to encipher and decipher message. In Symmetric Encryption, the encryption methods are extremely _____________, requiring minimal processing. - Correct Answers: efficient In symmetric encryption, both the sender and _____________ must possess encryption key. - Correct Answers: receiver In symmetric encryption, if either copy of key is compromised, an ________________ can decrypt and read messages. - Correct Answers: intermediate Asymmetric Encryption is also known as: - Correct Answers: public-key encryption Asymmetric encryption uses two different but __________ keys. Either key can encrypt or decrypt the message. - Correct Answers: related When using ciphers, ______ of crypto variable or key is very important. - Correct Answers: size Strength of many encryption applications and cryptosystems are measured by ______ size. - Correct Answers: key For ____________, security of encrypted data is not dependent on keeping encrypting algorithm secret. - Correct Answers: cryptosystems Cryptosystems security depends on: - Correct Answers: keeping some or all of elements of cryptovariables or keys secret.

Show more Read less
Institution
Mathematical Cryptography
Course
Mathematical Cryptography









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Mathematical Cryptography
Course
Mathematical Cryptography

Document information

Uploaded on
March 29, 2025
Number of pages
5
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Chapter 8 - Cryptography Exam
Questions with Answers
Cryptology - Correct Answers: science of encryption: combines cryptography and cryptanalysis.



Encryption - Correct Answers: The process of converting an original message

into a form that is unreadable by unauthorized individuals.



Cryptography - Correct Answers: process of making and using codes to secure transmission of info.



Cryptanalysis - Correct Answers: process of obtaining original message from encrypted message without
knowing algorithms.



Decryption - Correct Answers: the process of converting the ciphertext message back into plaintext so it
can be readily understood.



Key - Correct Answers: - the information used in conjunction with an algorithm to create the ciphertext
from the plaintext or derive the plaintext from the ciphertext.

- this can be a series of bits used by a computer program, or it can be a passphrase used by humans.



Algorithm - Correct Answers: - A set of steps or mathematical calculations used in

solving a problem

- In cryptography, it is the programmatic steps used to convert an unencrypted message into an
encrypted sequence of bits that represent the message, or the

programs that enable the cryptographic processes.



Foundations of Cryptology: - Correct Answers: - cryptology has a long and multicultural history



With emergence of technology; need for ______________ in information technology environment
greatly increased. - Correct Answers: encryption

, All popular web browsers use built-in encryption features for __________ e-commerce applications. -
Correct Answers: secure



Plaintext can be encrypted through two methods: - Correct Answers: 1. bit stream

2. block cipher



Bit Stream Method: - Correct Answers: each bit in the plaintext is transformed into a cipher bit one bit at
a time.



Block Cipher Method: - Correct Answers: the message is divided into blocks, and then each block of
plaintext bits is transformed into an encrypted block of cipher bits using an algorithm and key.



Substitution Cipher - Correct Answers: - substitute one value for another



Monoalphabetic substitution: - Correct Answers: uses only one alphabet



Polyalphabetic substitution: - Correct Answers: more advanced; uses two or more alphabets.



Vigenère cipher - Correct Answers: advanced cipher type that uses simple polyalphabetic code; made up
of 26 distinct cipher alphabets.



Transposition cipher - Correct Answers: - easy to understand, but if properly used, produces ciphertext
that is difficult to decipher.

- rearranges values within a block to create ciphertext

- to make the encryption even stronger, the keys and block sizes can be made much larger.



Transportation cipher can be done at the _____ level or at the byte (character) level. - Correct Answers:
bit



Exclusive OR - Correct Answers: a function of Boolean algebra ; two bits are compared
$14.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
EXAMSTUVIA

Also available in package deal

Thumbnail
Package deal
Exam (elaborations) TEST BANK FOR An Introduction to Mathematical Cryptography 2nd Edition
-
10 2025
$ 147.90 More info

Get to know the seller

Seller avatar
EXAMSTUVIA stuvia
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
1 year
Number of followers
2
Documents
1120
Last sold
5 months ago
Stuvia Exam

Assignments, Case Studies, Research, Essay writing service, Questions and Answers, Discussions etc. for students who want to see results twice as fast. I have done papers of various topics and complexities. I am punctual and always submit work on-deadline. I write engaging and informative content on all subjects. Send me your research papers, case studies, psychology papers, etc, and I’ll do them to the best of my abilities. Writing is my passion when it comes to academic work. I’ve got a good sense of structure and enjoy finding interesting ways to deliver information in any given paper. I love impressing clients with my work, and I am very punctual about deadlines. Send me your assignment and I’ll take it to the next level. I strive for my content to be of the highest quality. Your wishes come first— send me your requirements and I’ll make a piece of work with fresh ideas, consistent structure, and following the academic formatting rules. For every student you refer to me with an order that is completed and paid transparently, I will do one assignment for you, free of charge!!!!!!!!!!!!

Read more Read less
0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions