100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Chapter 5 2025

Beoordeling
-
Verkocht
-
Pagina's
1
Cijfer
A+
Geüpload op
23-04-2025
Geschreven in
2024/2025

1. Asymmetric cryptography - Cryptography wherein two keys are used: one to encrypt the message and another to decrypt it. 2. Block cipher - A form of cryptography that encrypts data in blocks; 64-bit blocks are quite common, although some algorithms (like AES) use larger blocks. 3. Bruteforce attack - An attack in which the attacker tries to decrypt a message by simply applying every possible key in the key space. 4. Caesar cipher - The method of cryptography in which someone chooses a number by which to shift each letter of a text in the alphabet and substitute the new letter for the letter being encrypted. For example, if your text is "A CAT," and you choose to shift by two letters, your encrypted text is "C ECV." This is also known as a monoalphabet, single-alphabet, or substitution cipher. 5. Carrier - The signal, stream, or data file into which the payload is hidden. 6. Channel - The type of medium used to hide data in steganography. This may be photos, video, sound files, or Voice over IP. 7. Cryptanalysis - A method of using techniques other than brute force to derive a cryptographic key. 8. Euler's Totient - The total number of coprime numbers. Two numbers are considered coprime if they have no common factors. 9. Feistel function - A cryptographic function that splits blocks of data into two parts. It is one of the most influential developments in symmetric block ciphers. 10. Kasiski examination - A method of attacking polyalphabetic substitution ciphers by deducing the length of the keyword. This is sometimes also called Kasiski's test or Kasiski's method. 11. Keyspace - The total number of keys. 12. Least significant bit (LSB) - The last bit or least significant bit is used to store data. 13. Payload - The data to be covertly communicated. In other words, it is the message you want to hide. 14. Social engineering - Nontechnical means of obtaining information you would not normally have access to.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

PLOT
Exposition - correct answersThe beginning of the story where the characters, the
setting, conflict is revealed

Inciting incident - correct answersPart of the EXPOSITION where an interesting conflict
(external or internal problem) is revealed or begins; sets action in motion

Rising Action - correct answersEvents leading to the climax, conflict is present,
suspense is present, longest portion of the story

Climax - correct answersThe most significant and exciting moment in a plot, a turning
point when the outcome is decided one way or another

Falling Action - correct answersIn the plot of a story or play, the action following the
climax of the work that moves it towards its denouement or resolution

Resolution or Denouement - correct answersThe conclusion and "wrap up" of a plot's
conflicts and complications

Protagonist - correct answersUsually but not always the main character; often the "good
guy"; The character whose conflict the reader cares about

Antagonist - correct answersA character or force in conflict with the main character, or
who/what creates the conflict

Theme - correct answers"THE MEssage" about life or human nature that the writer
wants to express to the reader

Symbolism - correct answersA literary device in literature where an object represents an
idea

Foreshadowing - correct answersClues in a story that suggest later events

Irony - correct answersA contrast between expectation and reality

Internal conflict - correct answersA conflict can be internal, involving opposing forces
within a person's mind

External conflict - correct answersA character struggles against some outside force:
another character, society as a whole, or some natural force

Geschreven voor

Vak

Documentinformatie

Geüpload op
23 april 2025
Aantal pagina's
1
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€10,14
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
SebastianRocky

Maak kennis met de verkoper

Seller avatar
SebastianRocky Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
0
Lid sinds
9 maanden
Aantal volgers
0
Documenten
303
Laatst verkocht
-

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen