Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

WGU D334 Cryptography / ITEC 2141 Introduction to Cryptography Exam Set Questions With Reviewed Correct Detailed Answers New Update!!

Rating
-
Sold
1
Pages
71
Grade
A+
Uploaded on
04-01-2025
Written in
2024/2025

WGU D334 Cryptography / ITEC 2141 Introduction to Cryptography Exam Set Questions With Reviewed Correct Detailed Answers New Update!! 1. Describe with two characters (Alice and Bob) the goal of cryptography. - ANSWER Alice encrypts a plaintext m into a ciphertext c transmitted to Bob who decrypts it with a secret decryption key k. 2. What is the property of secret keys ? - ANSWER 3. Describe with Alice and Bob the concept of asymmetric methods of encryption. - ANSWER Alice encrypts m using Bob's public key pk. Bob decrypts the ciphertext using his secret key sk. 4. What is a personal key ? - ANSWER 5. What is the upside of symmetric methods? - ANSWER They are way faster. 6. What is the upside of asymmetric methods - ANSWER They do not require us to dangerously share the key with the ones we want to communicate with. 7. What is the other name for asymmetric methods? - ANSWER Public-key methods. 8. How can we have the advantages of both? - ANSWER We can use an asymmetric method to safely share the key, and then use the symmetric method with this key. 9. What is data integrity? - ANSWER It is when the receiver can check whether the message was modified. 10. What is authentication (not authentification)? - ANSWER receiver can verify the origin of the message. 11. What is non-repudiation? - ANSWER It is when the sender cannot deny having sent a message. 12. What is a medium? - ANSWER It is the support of the messages (computer, paper). They do not provide safety. 13. What is a MAC? - ANSWER A Message Authentication Code is a sequence of bits m generated from the message m. We say that m has been augmented, and we call (m, m) the augmented message. 14. How can the receiver check an augmented message (m, m)? - ANSWER The receiver checks whether this property holds

Show more Read less
Institution
D334
Course
D334

Content preview

WGU D334 Cryptography / ITEC 2141
Introduction to Cryptography
Exam Set Questions With Reviewed
Correct Detailed Answers
New Update!!

1. Describe with two characters (Alice and Bob) the goal of cryptography.

- ANSWER Alice encrypts a plaintext m into a ciphertext c transmitted to Bob
who decrypts it with a secret decryption key k.

2. What is the property of secret keys ? - ANSWER




3. Describe with Alice and Bob the concept of asymmetric methods of encryption.

- ANSWER Alice encrypts m using Bob's public key pk. Bob decrypts the
ciphertext using his secret key sk.




4. What is a personal key ? - ANSWER

,5. What is the upside of symmetric methods? - ANSWER
They are way faster.

6. What is the upside of asymmetric methods - ANSWER
They do not require us to dangerously share the key with the ones we want to
communicate with.

7. What is the other name for asymmetric methods? - ANSWER
Public-key methods.

8. How can we have the advantages of both? - ANSWER
We can use an asymmetric method to safely share the key, and then use the
symmetric method with this key.

9. What is data integrity? - ANSWER
It is when the receiver can check whether the message was modified.

10. What is authentication (not authentification)? - ANSWER It is when the
receiver can verify the origin of the message.

11. What is non-repudiation? - ANSWER It is when the sender cannot deny
having sent a message.

12. What is a medium? - ANSWER It is the support of the messages (computer,
paper). They do not provide safety.

13. What is a MAC? - ANSWER A Message Authentication Code is a sequence
of bits m̄ generated from the message m. We say that m has been augmented,
and we call (m, m̄ ) the augmented message.

,14. How can the receiver check an augmented message (m, m̄ )? - ANSWER
The receiver checks whether this property holds




15. Which safety properties are ensured using digital signatures? - ANSWER
Authentication and non-repudiation
16. Which method (between symmetric and assymetric) is used in order to sign a
message? - ANSWER Public-key methods are used.


17. Describe with Alice and Bob how to sign a message m. - ANSWER
Alice applies an algorithm Sign with her secret key and gets the
signature s=Sign(sk, m). Bob recieves s for the message m. He can check the
signature with a publicly known verification algorithm Verify by doing :




18. Do we sign before or after the "hashing" (seen later)? - ANSWER
We sign after the hashing. This is generally why we use a hashing: We want to
sign a big document, but that would take too long. Therefore, we sign the hash
value of the document

, 19. What is Cryptanalysis? - ANSWER It is the study of attacks against
cryptographic schemes.

20. What is Cryptology? - ANSWER
It is a concept containing cryptography and cryptanalysis.

21. What is Kerckhoff's Principle? - ANSWER The adversary knows all the
details of the cryptosystem, including the algorithms and their implementations.

22. What are passive attacks? - ANSWER
It is an attack that is just trying to get information. It does not try to modify the
message. The one making an attack (Eve) is called an eavesdropper.




23. What are Ciphertext-only attacks? - ANSWER Eve has the ability to obtain
ciphertexts. She wants to deduce the message of a specific ciphertext.

24. What are Known-plaintext attacks? - ANSWER Eve has a list of plaintext-
ciphertext. She wants to deduce the message of a specific ciphertext (which is not
in the list).

25. What are chosen-plaintext attacks? - ANSWER Eve chooses a list of
plaintexts, and obtains a list of corresponding ciphertexts. Then, she looses the
power to get new ciphertexts, and attempts to decrypt an unseen cyphertext.

26. What are adaptively-chosen-plaintext attack? - ANSWER It is like chosen-
plaintext attacks, except that Eve does not loose the power of obtaining
ciphertexts.

27. What are chosen-ciphertext attacks? - ANSWER Eve chooses a list of
ciphertexts, and obtains a list of corresponding plaintexts. Then, she looses the
power to get new plaintexts, and attempts to encrypt an unseen plaintext.

Written for

Institution
D334
Course
D334

Document information

Uploaded on
January 4, 2025
Number of pages
71
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$21.84
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Thumbnail
Package deal
WGU D334 Cryptography / D334 Cryptography /WGU D334 Cryptography / ITEC 2141 Introduction to Cryptography / D334 - Introduction to Cryptography COMBINED SETS !!!
-
4 2025
$ 72.31 More info

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NURSINGDICTIONARY Harvard University
View profile
Follow You need to be logged in order to follow users or courses
Sold
267
Member since
2 year
Number of followers
87
Documents
2838
Last sold
2 weeks ago
NURSING ENCYCLOPEDIA

As a Career Tutor, I understand the pressure of managing demanding coursework, exams, and practical requirements across multiple disciplines. These professionally organized revision materials are designed to support students in nursing, healthcare administration, business, information systems, Engineering, health, IT, or trade courses management programs by simplifying complex concepts and reinforcing high-yield academic content. The materials are developed to help students: Understand core theories and practical applications across Multiple Disciplines Review exam relevant content aligned with undergraduate and graduate curriculam To Strengthen critical thinking, analytical reasoning, and decision-making skills Save time with clear, structured summaries instead of overwhelming textbooks Prepare efficiently for tests, assignments, case studies, and professional exams Each resource is created with academic standards in mind, integrating real world examples, industry terminology, and evidence based concepts commonly required in professional programs. Whether you are studying nursing fundamentals, healthcare management, information systems, project management, business strategy, Engineering these materials provide focused, reliable support for academic success. These revision guides are ideal for: Nursing and allied health students Healthcare administration and public health students Business, MBA, and management students Information technology and information systems students, engineering, business, IT, or trade courses If you are looking for clear, student-friendly, exam-focused revision materials that support multiple career pathways, these resources are designed to help you study smarter, perform better, and stay confident throughout your academic journey. WISH YOU SUCCESS!!

Read more Read less
4.2

34 reviews

5
18
4
7
3
7
2
1
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions