Assessment Exam Review Actual Exam Questions
6-60 and Answers | 100% Pass Guaranteed |
Graded A+ | 2025-2026
Save
Terms in this set (250)
XOR the following 1100010101101101
0101110101010111
1001100000111010
------------------
asymmetric key-based RSA
encryption DSA
-typical methods El Gamal
RC2- 40 bit key size 64 bit block
RC4- (Stream Cipher)- Used in SSL and WEP
Symmetric key-based
RC5- (Variable Key size, 32, 64, or 128 bit block size)
encryption
AES- (128, 192 or 256 bit key size, 128 bit block size)
-Typical Methods
DES- (56 bit key size. 64 bit Block size)
3DES- (112 bit key size, 64 bit block size)
, RC2(40 bit key size)
RC5(Variable block size)
IDEA
DES
Block Encryption
3DES
AES (Rijndael)
Blowfish
twofish
RC4
stream encryption
Chacha
The method of knowing the mapping between the
Rainbow Attack
hashed values and the original data
Dictionary-type attack a brute force analysis
does not belong to
∉
when an object is not in a set
Belongs to
∈
when an object is within a set
subset
⊆
subset has fewer elements or equal to the set
A∪ B union (objects that belong to set A or set B)
| such that
A∩B Intersection: in both A and B
Used a polyalphabetic substitution cipher, which did
not repeat within a reasonable time period, along with
a secret key. For the cracking of the Enigma cipher,
Enigma Machine -Cypher
the challenge was thus to determine both the
10
algorithm used and the key. Enigma's main weakness,
though, was that none of the plain text letters could
be ciphered as itself.
Uses four 5 × 5 matrices arranged in a square, are
Four-square cipher9 where each matrix contains 25 letters for encoding
and decoding operations.