100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane 300 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES (VERIFIED ANSWERS) ALREADY GRADED A+ 2025 NEW UPDATE

Puntuación
-
Vendido
-
Páginas
51
Grado
A+
Subido en
04-08-2025
Escrito en
2025/2026

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane 300 QUESTIONS AND CORRECT DETAILED ANSWERS WITH RATIONALES (VERIFIED ANSWERS) ALREADY GRADED A+ 2025 NEW UPDATE

Institución
WGU Course C839 - Intro To Cryptography
Grado
WGU Course C839 - Intro to Cryptography











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
WGU Course C839 - Intro to Cryptography
Grado
WGU Course C839 - Intro to Cryptography

Información del documento

Subido en
4 de agosto de 2025
Número de páginas
51
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

WGU Course C839 - Intro to Cryptography
Quizlet by Brian MacFarlane 300 QUESTIONS
AND CORRECT DETAILED ANSWERS WITH
RATIONALES (VERIFIED ANSWERS) ALREADY
GRADED A+ 2025 NEW UPDATE

____ was designed to provide built in cryptography for the clipper chip.


A Blowfish

B Skipjack

C GOST

D 3DES - CORRECT ANSWER: B



_____ uses at least two different shifts, changing the shift with different letters in the
plain text.


A Atbash

B multi-alphabet encryption
C Scytale

D Caesar cipher - CORRECT ANSWER: B



_____ was developed by Netscape and has since been supplanted by TLS. It was the
preferred method used with secure websites (i.e. https). - CORRECT ANSWER: SSL



_________ allows you to enter in any text, choose the historic algorithm you wish to
use, then encrypt that text in a matter of seconds. - CORRECT ANSWER: CrypTool

,_________ is designated as FIPS 197 and can have three different key sizes. They are:
128, 192, or 256 bits. This algorithm was developed by two Belgian cryptographers,
Joan Daemen and Vincent Rijmen. Unlike both DES and 3DES, it is not based on a
Feistel network. This algorithm uses a substitution-permutation matrix rather than a
Feistel network. It also operates on a four-by-four column-major order matrix of bytes,
called the state. - CORRECT ANSWER: AES



_________ uses a block size of 128 bits and key sizes up to 256 bits. It is a Feistel
cipher. It was designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner,
Chris Hall, and Niels Ferguson. - CORRECT ANSWER: Twofish



__________ is a symmetric block cipher that was designed in 1993 by Bruce Schneier.
This cryptography algorithm is intended as a replacement for DES. Like DES, it is a 16-
round Feistel cipher working on 64-bit blocks. However, unlike DES, it can have varying
key sizes ranging from 32 bits to 448 bits. There are really two parts to this algorithm.
The first part handles the expansion of the key. The second part actually encrypts the
data. The key expansion is handled in several steps. The first step is to break the
original key into a set of subkeys. Specifically, a key of no more than 448 bits is
separated into 4,168 bytes. There is a P-array and four 32-bit S-boxes. The P-array
contains 18 32-bit subkeys, while each S-box contains 256 entries. - CORRECT
ANSWER: Blowfish


__________ is an international standard for the format and information contained in a
digital certificate and is the most common type of digital certificate in the world. It was
first issued on July 3, 1988. It is a digital document that contains a public key signed by
the trusted third party, which is known as a Certificate Authority, or CA. Relied on by
S/MIME, it contains your name, info about you, and signature of the person who issued
the certificate. - CORRECT ANSWER: X.509



___________ was invented by a team of cryptographers including Vincent Rijmen, Joan
Daemen, Bart Preneel, Antoon Bosselaers, and Erik De Win. It uses a 64-bit block with
a 128-bit key and operates in six rounds. - CORRECT ANSWER: SHARK

,____________ uses the stream cipher RC4 (128 bit or 256 bit). For a 24-bit IV, there is
a 50% probability the same IV will repeat after 5000 packets - CORRECT ANSWER:
WEP (Wired Equivalent Privacy)



______________ is a measure of how many things interact at any one point. If the
effect of an option is limited to a small part of the program, then it cannot interact with
an option whose effect is limited to another part of the program. - CORRECT ANSWER:
Complexity


_______________ is the simplest form of authentication where the user's name and
password are transmitted over a network and compared to a table of name-password
pairs. Typically, the passwords stored in the table are encrypted; however, the
transmissions of the passwords are in cleartext, unencrypted. This is it's main
weakness. The Basic Authentication feature built into HTTP uses this form of
authentication. - CORRECT ANSWER: Password Authentication Protocol (PAP)



_______________ is the worst enemy of security, and it almost always comes in the
form of features or options. - CORRECT ANSWER: Complexity



________________ was created by David Wheeler and Roger Needham and first
publicly presented in 1994. It is a simple algorithm, easy to implement in code. It is a
Feistel cipher that uses 64 rounds (note this is a suggestion, it can be implemented with
fewer or more rounds). The rounds should be even since they are implemented in pairs
called, cycles. it uses a 128-bit key operating on a 64-bit block. It also uses a constant
that is defined as 232/the golden ratio. - CORRECT ANSWER: TEA, or Tiny Encryption
Algorithm



_________________ is a protocol for encrypting transmissions. A client and server
negotiate a connection by using a handshaking procedure, in which the client and
server agree on various parameters used to establish the connection's security. -
CORRECT ANSWER: Transport Layer Security (TLS)


_________________ is the art and science of writing hidden messages in such a way
that no one, apart from the sender and intended recipient, suspects the existence of the

, message. It is a form of security through obscurity. By altering the least significant bit,
one can hide additional data without altering the original file in any noticeable way. -
CORRECT ANSWER: Steganography



__________________ is a form of cryptanalysis applicable to symmetric key algorithms
and was invented by Eli Biham and Adi Shamir.



Essentially, it is the examination of differences in an input and how that affects the
resultant difference in the output. It originally worked only with chosen plaintext.



It could also work with known plaintext and ciphertext. - CORRECT ANSWER:
Differential cryptanalysis



_____________________ was a cylinder tool used by the Greeks, and is often
specifically attributed to the Spartans. It was a physical cylinder that was used to
encrypt messages. Turning the cylinder produced different ciphertexts. While it is not
clear exactly how old this cipher is, it was first mentioned in the 7th century BC by the
Greek poet Archilochus. The recipient uses a rod of the same diameter as the one used
to create the message. He then wraps the parchment to read the message. To encrypt,
one simply writes across the leather. - CORRECT ANSWER: Scytale



____________________________ calculates a hash after the user has logged in, then
it shares that hash with the client system. Periodically, the server will ask the client to
provide that hash (this is the challenge part). If the client cannot, then it is clear that the
communications have been compromised. - CORRECT ANSWER: Challenge
HandShake Authentication Protocol (CHAP)


____________________________ is a 160-bit hash algorithm developed by Hans
Dobbertin, Antoon Bosselaers, and Bart Preneel. There exist 128-, 256-, and 320-bit
versions of this algorithm, called RIPEMD-128, RIPEMD-256, and RIPEMD-320,
respectively. These all replace the original RIPEMD which was found to have collision
issues. The larger bit sizes make this far more secure that MD5 or RIPEMD. -
CORRECT ANSWER: RACE Integrity Primitives Evaluation Message Digest (RIPEMD-
160)
$30.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Tutordiligent Chamberlain College Of Nursng
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
577
Miembro desde
2 año
Número de seguidores
218
Documentos
8067
Última venta
1 hora hace
Tutordiligent

Tutordiligent is a Medical Professional with a Bachelor of Medicine and Bachelor of Surgery (MBBS) from Chamberlain College of Nursing of Health Sciences. His academic journey included internships in Radiology, Cardiology, and Neurosurgery. His contributions to medical research extend to two publications in medical journals, solidifying his position as a promising addition to the field.

3.6

87 reseñas

5
32
4
18
3
21
2
2
1
14

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes