Which choice is NOT one of the three roles of Cryptography? ✔️Ans -
Cryptography is a security system to backup data
What popular programing function is used for Modulo 2? ✔️Ans - The
exclusive-or (XOR) you find in programming languages.
NOT All block cipher modes leak some information ✔️Ans - False
There are several sources of trust, which selection below is NOT. ✔️Ans -
What is 7 + 2 (Mod 7)? ✔️Ans - 2
Counter mode, generally known by the three-letter abbreviation CTR, is
another block cipher encryption mode as well as stream cipher mode.
✔️Ans - True
SET is a protocol for _____. ✔️Ans - Online Shopping
The simplest method to encrypt a longer plaintext is known as the ______ .
✔️Ans - ECB Electronic codebook mode
SHA-1 and SHA-2 are the secure hash algorithms required by law for use in
certain ____ ✔️Ans - US Government applications
MD5 has been utilized in a wide variety of cryptographic applications, and
is also commonly used to verify _____ ✔️Ans - Data integrity
Which choice is NOT one of the three functions the authors use when
generating RSA keys in regards to signatures? ✔️Ans - It uses bilinear
system threading
The best way to have confidence in building something secure is to keep it
simple. ✔️Ans - True
, Virtually all block ciphers consist of several repetitions of a weak block
cipher, known as a ____ ✔️Ans - Round
The process of encoding messages or information in such a way that only
authorized parties can read it is called ____________. ✔️Ans - Encryption
The primary use of padding with classical ciphers is to prevent _____
✔️Ans - The cryptanalyst from using that predictability to find
Cryptanalysis that aid in breaking the encryption
This attack occurs when the attacker records a message and then later
resends that same message ✔️Ans - Replay
A PKI (Public Key Infrastructure) is an arrangement that binds public keys
with respective user identities by means of a ____________. ✔️Ans -
Certificate Authority CA
The first algorithm we show is the initialization of the channel data. What
are the two main functions? ✔️Ans - Setting up the keys and the
message numbers
Message numbers are vital for various reasons, which choice below is
✔️Ans - They provide a source for IVs for the encryption algorithm
Which message authentication code (MAC) do the authors suggest to use?
✔️Ans - HMAC-SHA-256
This layer is the encoding layer where each data element of the message
has to be converted to a sequence of bytes. ✔️Ans - Message encoding
and parsing
What is 32 (Mod 5)? ✔️Ans - 2
What is one of the great advantages of RSA? ✔️Ans - It can be used for
both encrypting messages and signing messages
Complexity is the main enemy of security. Therefore, any security design
should strive for simplicity. ✔️Ans - True