100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Introduction to Cryptography - D334 ACTUAL EXAM QUESTIONS WITH COMPLETE SOLUTION GUIDE (A+ GRADED 100% VERIFIED) LATEST VERSION 2025!!

Rating
-
Sold
-
Pages
37
Grade
A
Uploaded on
09-05-2025
Written in
2024/2025

Introduction to Cryptography - D334 ACTUAL EXAM QUESTIONS WITH COMPLETE SOLUTION GUIDE (A+ GRADED 100% VERIFIED) LATEST VERSION 2025!!

Institution
Introduction To Cryptography - D334
Module
Introduction to Cryptography - D334











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Introduction to Cryptography - D334
Module
Introduction to Cryptography - D334

Document information

Uploaded on
May 9, 2025
Number of pages
37
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

5/9/25, 9:34 AM Introduction to Cryptography - D334 ACTUAL EXAM QUESTIONS WITH COMPLETE SOLUTION GUIDE (A+ GRADED 100% VERI…


Scheduled maintenance: May 10, 2025 from 07:00 AM to 10:00 AM




Introduction to Cryptography - D334 ACTUAL
EXAM QUESTIONS WITH COMPLETE SOLUTION
GUIDE (A+ GRADED 100% VERIFIED) LATEST
VERSION 2025!!

Save




Terms in this set (250)


XOR the following 1100010101101101
0101110101010111
1001100000111010
------------------

asymmetric key-based RSA
encryption DSA
-typical methods El Gamal

RC2- 40 bit key size 64 bit block
RC4- (Stream Cipher)- Used in SSL and WEP
Symmetric key-based
RC5- (Variable Key size, 32, 64, or 128 bit block size)
encryption
AES- (128, 192 or 256 bit key size, 128 bit block size)
-Typical Methods
DES- (56 bit key size. 64 bit Block size)
3DES- (112 bit key size, 64 bit block size)




https://quizlet.com/1041860007/introduction-to-cryptography-d334-actual-exam-questions-with-complete-solution-guide-a-graded-100-verified-latest-v… 1/37

,5/9/25, 9:34 AM Introduction to Cryptography - D334 ACTUAL EXAM QUESTIONS WITH COMPLETE SOLUTION GUIDE (A+ GRADED 100% VERI…


RC2(40 bit key size)
RC5(Variable block size)
IDEA
DES
Block Encryption
3DES
AES (Rijndael)
Blowfish
twofish

RC4
stream encryption
Chacha

The method of knowing the mapping between the
Rainbow Attack
hashed values and the original data

Dictionary-type attack a brute force analysis

does not belong to

when an object is not in a set

Belongs to

when an object is within a set

subset

subset has fewer elements or equal to the set

A∪ B union (objects that belong to set A or set B)

| such that

A∩B Intersection: in both A and B

Used a polyalphabetic substitution cipher, which did
not repeat within a reasonable time period, along with
a secret key. For the cracking of the Enigma cipher,
Enigma Machine -Cypher
the challenge was thus to determine both the
10
algorithm used and the key. Enigma's main weakness,
though, was that none of the plain text letters could
be ciphered as itself.

Uses four 5 × 5 matrices arranged in a square, are
Four-square cipher9 where each matrix contains 25 letters for encoding
and decoding operations.
https://quizlet.com/1041860007/introduction-to-cryptography-d334-actual-exam-questions-with-complete-solution-guide-a-graded-100-verified-latest-v… 2/37

,5/9/25, 9:34 AM Introduction to Cryptography - D334 ACTUAL EXAM QUESTIONS WITH COMPLETE SOLUTION GUIDE (A+ GRADED 100% VERI…


Cypher Code mapping that is only used once.
Advantage: it is essentially unbreakable.
One-time pad cypher8
Disadvantage: it takes lots of work as you would have
to generate the pad to be used, each time.

Polyalphabetic cipher that involves using a different
mapping, based on a keyword, for each character of
the cipher. An advantage of this type of cipher is that
Vigenere Cipher 7
the same plaintext character is likely to be coded to
different mappings, depending on the position of the
keyword, making guessing more difficult.

Mono-alphabetic substitution cipher known as "shift"
cipher. Involves plaintext being replaced by a letter
some fixed number of positions down the alphabet.
Ceasar Cipher6
i.e., a Caesar Cipher using a shift of +3 would mean a
plaintext letter A would result in a ciphertext letter D
(a shift of three positions to the right in the alphabet)

Encoding method, rather than a cipher, that works by
Morse Code cipher 5 translating characters into sequences of dots (.) and
dashes (-)

5 × 5 matrix containing the alphabet less the letter J.
Playfair Cipher 4 Cipher/decipher process consists of a set of rules
outlining use of column and row combinations.

Makes use of a grid and which maps the letters into
BIFID Cipher 3
numeric values.

Employs a method to scramble text by writing it in a
Rail Code Cipher 2
sequence across a number of rails.

Mono- alphabetic substitution cipher that makes use
of mapping plaintext characters to graphical
characters rather than to alphabetic ones. i.e. A=(pick a
Pig Pen Cipher 1
symbol), vs A=(pick a letter). Disadvantage: once the
mapping is known, it is difficult to keep the message
secret.

Encryption in simplest terms is changing plaintext into ciphertext

https://quizlet.com/1041860007/introduction-to-cryptography-d334-actual-exam-questions-with-complete-solution-guide-a-graded-100-verified-latest-v… 3/37

, 5/9/25, 9:34 AM Introduction to Cryptography - D334 ACTUAL EXAM QUESTIONS WITH COMPLETE SOLUTION GUIDE (A+ GRADED 100% VERI…


Decryption The process of converting a ciphertext into plaintext.

Encrypt individual files and encrypt full disks with
AESCrypt
options such as Bitlocker and FileVault

c code or substitution is where a single mapping from
Mono-alphabetic our alphabet to a cipher alphabet is created. Many
early cryptosystems used this.

refers to the mapping of our alphabet to a number of
Polyalphabetic cipher alphabets. This approach added a bit of
complexity to early cryptosystems.

is considered to be unbreakable since it only uses its
One-time pad
cipher code once.

This method repeats the random numbers after a
Pseudo-Random Number given time (periodic). They are fast and are also
Generators (PRNGs) deterministic and are useful in producing a repeatable
set of random numbers.

is cipher cracking methodology that involves
identifying patterns and variations in the probability of
codes. i.e. a three-letter ciphered text combination
Frequency Analysis
spotted at the beginning of a string too often could
tip us off that those three letters correlate the letters
THE in the English alphabet.

This method generates a true random number and
uses some form of random process. One approach is
to monitor the movements of a mouse pointer on a
True Random Number
screen or from the pauses between keystrokes.
Generators (TRNGs)
Overall, the method is generally slow, especially if it
involves human interaction, but is non-deterministic
and aperiodic.

measures level of unpredictability; in encryption
Entropy relates to the degree of uncertainty of the encryption
process.

ASCII 8-bit values, up to 256 characters


https://quizlet.com/1041860007/introduction-to-cryptography-d334-actual-exam-questions-with-complete-solution-guide-a-graded-100-verified-latest-v… 4/37

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
CodedNurse Nightingale College
Follow You need to be logged in order to follow users or courses
Sold
3807
Member since
1 year
Number of followers
22
Documents
8985
Last sold
8 hours ago
coded

"I specialize in key academic areas such as Psychology, Nursing, Human Resource Management, and Mathematics. Providing students with top-quality work is my priority, and I always uphold the highest scholarly standards. This commitment has earned me the distinction of being a Gold-Rated Tutor on Stuvia. You can trust my work to help you achieve excellent grades!"

3.5

70 reviews

5
23
4
15
3
16
2
3
1
13

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions