100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

DRO2 Cryptography Chapter 1 Exam Prep – PRNG, Ciphers, Probability & Encoding|Questions Verified Provided with Complete A+ Graded Rationales Lates Updated 2026

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
01-02-2026
Written in
2025/2026

DRO2 Cryptography Chapter 1 Exam Prep – PRNG, Ciphers, Probability & Encoding|Questions Verified Provided with Complete A+ Graded Rationales Lates Updated 2026 Which type of random number generator would be the best choice if you were looking for fast speed? Pseudo-random number generator (PRNG) Which cipher makes use of a grid which maps letters into numeric values as part of the encryption process? BIFID Which computing architecture type stores the most significant byte in the lowest memory address? Big Endian In terms of probability, the events that make up the possible outcome of a coin toss would be considered what? mutuality exclusive Which simple cipher method attempts to bolster complexity by adding additional alphabets to be used for the substitution rounds and can change its mapping depending on a variable keyword? polyalphabet The aim of the ______ cipher is to scramble plaintext letters by writing a message in sequence across a number of rails. Rail Fence Within ASCII encoding, characters are mapped to what type of values? Select all that apply. Hex Binary Decimal _____ is the largest positive integer that divides into two numbers without a remainder. GCD If I roll a single standard die, what is the probability that I roll a "3"? 0.167 If you are sending an encrypted message to a colleague using secret-key (symmetric) cryptography, of the choices below, (1) which key would you use to encrypt the message, and (2) which key would your colleague use to decrypt the message? (1) your secret key, (2) your secret key Which simple cipher method entails creation of a single mapping from a given alphabet to a cipher alphabet? mono-alphabetic The Pigpen cipher uses a polyalphabet substitution method. False In _________ encryption, two electronic keys are used, one is used to encrypt the plaintext, and the other is used to decrypt it back to plaintext. asymmetric-key Which type of random number generator would be the best choice if you were interested in avoiding repeating to reduce chances of a value being guessed? True random number generator (TRNG) When setting up the table for use with the Playfair cipher, you should ensure no letters are repeated and also be sure to omit which letter from the matrix? J A ______ is a value which only has factors of 1 and itself, and used in areas such as key exchange and in public key encryption. Prime number What describes a cipher code mapping used only once and then discarded essentially making it uncrackable? One-time pad ________ published the first successful attack against the Vigenère cipher in 1863. Kasiski Which cipher from the list below uses graphical characters such as symbols of some sort for mapping vs mapping to alphabetic characters? Pigpen Cipher Which computing architecture type stores the least significant byte in the lowest memory address? Little Endian In _________ encryption, we use a single electronic key to encrypt the plaintext, and the same key is then used to decrypt. secret-key Scrambled alphabet cipher schemes are easy to implement, but also easy to break mainly via observation of what? Letter and word frequency ASCII utilizes 8-bit values and supports up to 65,536 characters. False Of the choices below, select the ones that are prime numbers. Select all that apply. 72 In _________ encryption, we use a single electronic key to encrypt the plaintext, and the same key is then used to decrypt. symmetric What type of code aims to overcome the ease at which letter and symbol probability in ciphertext can be analyzed, by varying the number of codes mapped to each character? Homophonic substitution code From the list below, which is used for performing full disk encryption? FileVault ________ is a polyalphabetic cipher that employs an improved code over the scrambled alphabet approach, where a different mapping, based on a keyword, is used for each character of the cipher. Vigenère cipher A ____ repeats a random number after a given time (periodic). They are fast and are also deterministic, and are useful in producing a repeatable set of random numbers. Pseudo-random number generator (PRNG) Modulo-2 multiplication operations is equivalent to logical ____ operations. AND Given the two sets (Set A and Set B) of objects below, select the true statement from the list below that

Show more Read less
Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
February 1, 2026
Number of pages
5
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

DRO2 Cryptography Chapter 1 Exam Prep – PRNG, Ciphers,
Probability & Encoding|Questions Verified Provided with
Complete A+ Graded Rationales Lates Updated 2026
Which type of random number generator would be the best choice if you were looking for fast
speed?

Pseudo-random number generator (PRNG)

Which cipher makes use of a grid which maps letters into numeric values as part of the
encryption process?

BIFID

Which computing architecture type stores the most significant byte in the lowest memory
address?

Big Endian

In terms of probability, the events that make up the possible outcome of a coin toss would be
considered what?

mutuality exclusive

Which simple cipher method attempts to bolster complexity by adding additional alphabets to
be used for the substitution rounds and can change its mapping depending on a variable
keyword?

polyalphabet

The aim of the ______ cipher is to scramble plaintext letters by writing a message in sequence
across a number of rails.

Rail Fence

Within ASCII encoding, characters are mapped to what type of values? Select all that apply.

Hex

Binary

Decimal

_____ is the largest positive integer that divides into two numbers without a remainder.

GCD

, If I roll a single standard die, what is the probability that I roll a "3"?

0.167

If you are sending an encrypted message to a colleague using secret-key (symmetric)
cryptography, of the choices below, (1) which key would you use to encrypt the message, and
(2) which key would your colleague use to decrypt the message?

(1) your secret key, (2) your secret key

Which simple cipher method entails creation of a single mapping from a given alphabet to a
cipher alphabet?

mono-alphabetic

The Pigpen cipher uses a polyalphabet substitution method.

False

In _________ encryption, two electronic keys are used, one is used to encrypt the plaintext, and
the other is used to decrypt it back to plaintext.

asymmetric-key

Which type of random number generator would be the best choice if you were interested in
avoiding repeating to reduce chances of a value being guessed?

True random number generator (TRNG)

When setting up the table for use with the Playfair cipher, you should ensure no letters are
repeated and also be sure to omit which letter from the matrix?

J

A ______ is a value which only has factors of 1 and itself, and used in areas such as key
exchange and in public key encryption.

Prime number

What describes a cipher code mapping used only once and then discarded essentially making it
uncrackable?

One-time pad

________ published the first successful attack against the Vigenère cipher in 1863.

Kasiski

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
LectAziim Teachme2-tutor
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
2 year
Number of followers
13
Documents
4143
Last sold
3 months ago
Dont stress yourself on study materials .LectAziim got it all

"Unlock your potential with our online writing store! Discover expert guidance, personalized feedback, and tools for every writer's journey. From crafting compelling essays to mastering creative storytelling, our platform offers interactive courses, one-on-one coaching, and resources tailored to your goals. Start writing your success story today with us!"

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions