Questions With All Correct Detailed
Answers 2025 New Update
What is a cipher that does not replace letters but simply rearranges them? - Answer - ✔
Transposition Cipher
What cipher substitutes one letter for an other? - Answer - ✔ Substitution Cipher
What is the term for the practice and study of determining the meaning of encrypted
information? - Answer - ✔ Cryptanalysis
What method is used by attackers that tries every possible key knowing that eventually
one of them will work? - Answer - ✔ Brute-Force
What method is used by attackers when they have access to the ciphertext and of
several messages and knows nothing about the plaintext? - Answer - ✔ Ciphertext
What method is used by attackers when they have access to the ciphertext and of
several messages and knows something about the plaintext? - Answer - ✔ Known-
Plaintext
What method is used by attackers who chooses which data the encryption device
encrypts and observes the cipher out put? - Answer - ✔ Chosen-Plaintext
What method is used by attackers who chooses different ciphertext to be decrypted and
has access to the decrypted data? - Answer - ✔ Chosen-Ciphertext
What method is used by attacker who knows a portion of the plaintext and the
corresponding ciphertext? - Answer - ✔ Meet-in-the-Middle
What is the term for the development and use of codes? - Answer - ✔ Cryptography
A customer purchases an item from an e-commerce site. The e-commerce site must
maintain proof that the data exchange took place between the site and the customer.
Which feature of digital signatures is required? - Answer - ✔ non-repudiation of the
transaction
Which requirement of secure communications is ensured by the implementation of MD5
or SHA hash generating algorithms? - Answer - ✔ integrity
The following message was encrypted using a Caesar cipher with a key of 2: