Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

Cryptography

Puntuación
-
Vendido
-
Páginas
8
Grado
A+
Subido en
29-05-2023
Escrito en
2022/2023

How do you determine the number of key space? - Correct AnswerRaise 2 to the power of the number of bits in the key space. Ex: 4-bit key space would equal 16. Cryptography provides what four key points? - Correct AnswerConfidentiality, Data Integrity, Authentication, and Non-Repudiation What are some logical operations used in cryptography? - Correct AnswerAND operation, OR operation, Not operation, and Exclusive OR (XOR). What are some general encryption techniques? - Correct AnswerSubstitution, Permutation (Transposition), Hybrid What are some different types of substitution techniques? - Correct AnswerMonoalphabetic, Homophonic, Polygram, Polyalphabetic What are three types of cryptosystems? - Correct AnswerSymmetric (secret key, one-key), Asymmetric (public key, two-key), Hashing (One-way, no encryption) What is the purpose and steps of Digital Signature? - Correct Answer"Digital signatures provide authentication and integrity, which forms nonrepudiation. They do not provide confidentiality: the plaintext remains unencrypted. (1) A plaintext test message is created (2) A hash function generates a hash value of the plaintext. (3) A digital signature by encrypting the hash with his RSA private key. (4) Lastly, the user attaches the signature to their plaintext email and sends. Explain the Kerckhoff's Principle - Correct Answer(1) Cryptosystem should not be secret, (2) The key should be secret, (3) Cipher's should be unbreakable, (4) Keys should be..., (5) What are ways to encrypt data? - Correct AnswerBreak data into Blocks and encrypt each block or Encrypt the entire stream on a bit-by-bit basis What are features of a Stream ciphers? - Correct AnswerStream is encrypted one bit or byte at a time, High speed and low hardware complexity, great for audio, video, & telephone. What are features of a Block ciphers? - Correct AnswerBlock Encrypted a message a block at a time through "Chunking" Identify and explain the Block Cipher Modes - Correct Answer"Electronic Code Block (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR)" If a symmetric key is encrypted with a receiver's public key, what security service(s) is (are) provided? - Correct AnswerConfidentiality. Only the reciever's private key can be used to decrypt the symmetric key, and only the receiver should have access to this private key. If data is encrypted with the sender's private key, what security service(s) is (are) provided? - Correct AnswerAuthentcity of the sender and nonrepduction. If the reciever can decrypt the encrypted data with the sender's public key, then they know the data was encrypted with the sender's private key. If the sender encrypts data with the receiver's private key, what security services(s) is (are) provided? - Correct AnswerNone. No one but the owner of the private key should have acess to it. (trick question) Why do we encrypt the message with the symmetric key? - Correct AnswerBecause the asymmetric key algorithm is too slow. Why don't we encrypt the symmetric key with another symmetric key? - Correct AnswerThe symmetric key needs to get to destination securely, which can only by carried out through asymmetric cryptography via the use of public and private keys to provide a mechanism for secure transport of symmetric key.

Mostrar más Leer menos
Institución
Cryptography
Grado
Cryptography









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Cryptography
Grado
Cryptography

Información del documento

Subido en
29 de mayo de 2023
Número de páginas
8
Escrito en
2022/2023
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$16.89
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
derricksunguri

Conoce al vendedor

Seller avatar
derricksunguri Exam Questions
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
-
Miembro desde
2 año
Número de seguidores
0
Documentos
104
Última venta
-

0.0

0 reseñas

5
0
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes