Introduction to Cryptography - D334 COMPLETE
QUESTIONS AND CORRECT DETAILED ANSWERS
\VERIFIED SOLUTIONS \LATEST UPDATE 2025
Which cryptanalysis attacks Keystream analysis
involve examining patterns
in the random
characters combined with
the plaintext
message to produce the
ciphertext to see how long
the key goes before it
starts to repeat?
A Linear cryptanalysis
B Frequency analysis
C Algebraic attacks
D Keystream analysis
A social media company NOBUS backdoor
refuses to hand over the
encryption keys involved in
secure communications to
the government for an
ongoing investigation.
Which
cryptographic backdoor will
allow only the government
agents to crack the
encryption, but no one else?
A RSA cracking
B Encryption by default
C Key escrow
D NOBUS backdoor
/ 1/28
,8/4/25, 1:12 AM Introduction to Cryptography - D334
A bank's customer opens Check the certificate revocation list (CRL)
the log-in page of the
bank to do an online
banking
transaction. How can the
customer verify that the
bank's digital certificate is
trustworthy and has not
been canceled by the
issuing certificate authority
(CA)?
A Submit a request to the
certification a uthority
B Check the CRL distribution
point (CDP)
C Check the PKI
D Check the certificate
revocation list (CRL)
Cryptography provides Non-repudiation
various security benefits.
Which cryptographic
benefit is
used in e-commerce to
provide proof that a
customer cannot deny
being the source of a
transaction?
A Proof of origin
B Confidentiality
C Integrity
D Non-repudiation
/ 2/28
, 8/4/25, 1:12 AM Introduction to Cryptography - D334
A developer wants to send a Asymmetric encryption
message to a system
administrator over the
internet, so the developer
uses the system
administrator's publicly
known key to send the
message. The system
administrator is able to
decrypt the message using
a unique private key.
Which encryption method
are the developer and
system administrator
using to communicate the
message?
A Stream encryption
B Asymmetric encryption
C Block encryption
D Symmetric encryption
A developer wants to Add salt with an initialization vector
send a system
administrator an encrypted
message but is concerned
that an intruder might copy
the encrypted message
and play back the
ciphertext to decode the
original message. How can
the developer make sure
that the ciphertext does
not give the original
plaintext if played back?
A Use shift row transformation
B Use electronic code book
C Use RC5 cipher
D Add salt with an
initialization vector
/ 3/28