100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Case

D334 ITAS 2141 Intro to Cryptography FA Review 2025 (Qns & Ans)

Rating
-
Sold
-
Pages
38
Uploaded on
17-04-2025
Written in
2024/2025

D334 ITAS 2141 Intro to Cryptography FA Review 2025 (Qns & Ans)D334 ITAS 2141 Intro to Cryptography FA Review 2025 (Qns & Ans)D334 ITAS 2141 Intro to Cryptography FA Review 2025 (Qns & Ans)D334 ITAS 2141 Intro to Cryptography FA Review 2025 (Qns & Ans)

Show more Read less











Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
April 17, 2025
Number of pages
38
Written in
2024/2025
Type
Case
Professor(s)
Unknown
Grade
Unknown

Subjects

Content preview

D334 ITAS 2141 Intro to Cryptography

Final Assessment Review (Qns & Ans)

2025



Multiple Choice Questions
Which of the following algorithms is not a symmetric encryption
algorithm?
a) AES
b) DES
c) RSA
d) Blowfish
ANS: c) RSA
Rationale: RSA is an asymmetric encryption algorithm, while
AES, DES, and Blowfish are symmetric.
©2025

,What is the primary purpose of a hash function in cryptography?
a) To encrypt data
b) To generate random numbers
c) To verify data integrity
d) To establish a secure channel
ANS: c) To verify data integrity
Rationale: Hash functions are used to ensure that data has not
been altered.


Which of the following describes a one-time pad?
a) A reusable key
b) A key that is as long as the message
c) A symmetric key
d) An encryption scheme without any key
ANS: b) A key that is as long as the message
Rationale: A one-time pad uses a key that is the same length as
the message, providing perfect secrecy if used correctly.


What is the main vulnerability of the RSA algorithm?
a) Key length
©2025

,b) Public key exposure
c) Implementation flaws
d) Both a and c
ANS: d) Both a and c
Rationale: RSA is vulnerable to attacks if keys are not sufficiently
long and if proper implementation practices are not followed.


In a digital signature scheme, the private key is used to:
a) Encrypt the message
b) Encrypt the hash of the message
c) Decrypt the signature
d) Generate the hash
ANS: b) Encrypt the hash of the message
Rationale: The private key is used to sign by encrypting the hash
of the message, allowing verification with the public key.


Fill-in-the-Blank Questions
The principle of __________ states that a cryptographic key must
remain secret to ensure security.
ANS: Confidentiality
Rationale: Confidentiality ensures that data remains private and
secure from unauthorized access.
©2025

, The process of transforming plaintext into ciphertext is known as
__________.
ANS: Encryption
Rationale: Encryption is the method of converting data into a
format that cannot be understood without a key.


A __________ attack is when an adversary tries all possible keys
to decrypt a message.
ANS: Brute-force
Rationale: Brute-force attacks involve systematically checking all
possible keys until the correct one is found.


The __________ is a mathematical function used to combine
input data into a fixed-size output, commonly used in hashing.
ANS: Hash function
Rationale: Hash functions transform variable-length data into a
fixed-length hash, preserving data integrity.


Public key infrastructure (PKI) relies on __________ to verify the
ownership of public keys.
ANS: Digital certificates


©2025

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bankart Chamberlain College of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
150
Member since
2 year
Number of followers
31
Documents
4512
Last sold
1 week ago

3.6

21 reviews

5
9
4
0
3
9
2
1
1
2

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions