Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cryptography

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
29-05-2023
Geschreven in
2022/2023

How do you determine the number of key space? - Correct AnswerRaise 2 to the power of the number of bits in the key space. Ex: 4-bit key space would equal 16. Cryptography provides what four key points? - Correct AnswerConfidentiality, Data Integrity, Authentication, and Non-Repudiation What are some logical operations used in cryptography? - Correct AnswerAND operation, OR operation, Not operation, and Exclusive OR (XOR). What are some general encryption techniques? - Correct AnswerSubstitution, Permutation (Transposition), Hybrid What are some different types of substitution techniques? - Correct AnswerMonoalphabetic, Homophonic, Polygram, Polyalphabetic What are three types of cryptosystems? - Correct AnswerSymmetric (secret key, one-key), Asymmetric (public key, two-key), Hashing (One-way, no encryption) What is the purpose and steps of Digital Signature? - Correct Answer"Digital signatures provide authentication and integrity, which forms nonrepudiation. They do not provide confidentiality: the plaintext remains unencrypted. (1) A plaintext test message is created (2) A hash function generates a hash value of the plaintext. (3) A digital signature by encrypting the hash with his RSA private key. (4) Lastly, the user attaches the signature to their plaintext email and sends. Explain the Kerckhoff's Principle - Correct Answer(1) Cryptosystem should not be secret, (2) The key should be secret, (3) Cipher's should be unbreakable, (4) Keys should be..., (5) What are ways to encrypt data? - Correct AnswerBreak data into Blocks and encrypt each block or Encrypt the entire stream on a bit-by-bit basis What are features of a Stream ciphers? - Correct AnswerStream is encrypted one bit or byte at a time, High speed and low hardware complexity, great for audio, video, & telephone. What are features of a Block ciphers? - Correct AnswerBlock Encrypted a message a block at a time through "Chunking" Identify and explain the Block Cipher Modes - Correct Answer"Electronic Code Block (ECB), Cipher Block Chaining (CBC), Cipher Feedback (CFB), Output Feedback (OFB), and Counter (CTR)" If a symmetric key is encrypted with a receiver's public key, what security service(s) is (are) provided? - Correct AnswerConfidentiality. Only the reciever's private key can be used to decrypt the symmetric key, and only the receiver should have access to this private key. If data is encrypted with the sender's private key, what security service(s) is (are) provided? - Correct AnswerAuthentcity of the sender and nonrepduction. If the reciever can decrypt the encrypted data with the sender's public key, then they know the data was encrypted with the sender's private key. If the sender encrypts data with the receiver's private key, what security services(s) is (are) provided? - Correct AnswerNone. No one but the owner of the private key should have acess to it. (trick question) Why do we encrypt the message with the symmetric key? - Correct AnswerBecause the asymmetric key algorithm is too slow. Why don't we encrypt the symmetric key with another symmetric key? - Correct AnswerThe symmetric key needs to get to destination securely, which can only by carried out through asymmetric cryptography via the use of public and private keys to provide a mechanism for secure transport of symmetric key.

Meer zien Lees minder
Instelling
Cryptography
Vak
Cryptography









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Cryptography
Vak
Cryptography

Documentinformatie

Geüpload op
29 mei 2023
Aantal pagina's
8
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€15,17
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
derricksunguri

Maak kennis met de verkoper

Seller avatar
derricksunguri Exam Questions
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
2 jaar
Aantal volgers
0
Documenten
104
Laatst verkocht
-

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen