The ABCS of cryptography

¡Supera tus tareas y exámenes ahora con Quizwiz!

A primary requirement for a good cryptographic hash function is that the function should not produce too many collisions. A collision in a hash function is when:

2 inputs map to the same output.

Compute the value of: 23 mod 4 = ?

3

Which of the following methods are effective in cracking the Caesar cipher?

Brute force and letter frequency analysis

Encrypted information is only viewable by authorized users who have the correct key to decrypt. This describes which aspect of the CIA triad?

Confidentiality

Encryption plays a crucial role in maintaining which part(s) of the CIA triad?

Confidentiality and Integrity

Which of the following shows the word "CAT" encrypted with the Caesar cipher with a key of 1?

DBU

True or False: A message in unencrypted form is called ciphertext.

False

True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method for cracking the encryption.

False

Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: I. It is computationally infeasible to compute the private key based on the public key. II. It's easier to share one public key than billions of private keys. III. It's much tougher to crack an asymmetric encryption than a symmetric one. IV. It's more secure because the private keys do not ever need to be transmitted or revealed to anyone.

I - IV all

Most attacks on hash functions involve: I. Finding collisions. II. Injecting a new hash function into the code. III. Pre-generating millions of hashes and comparing them to the plain text that generated it. IV. Really good random guessing.

I, II and III

Which of the following shows the word "DOG" encrypted with the Caesar cipher with a key of 5?

ITL

Cryptography is defined as:

The practice of encoding information so only authorized people can read it

Why do we use cryptography?

To secure digital and non-digital data To allow important messages to be sent with lower chances of being interpreted To add security to the use of specific machinery

Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.

True

True or False: Computers have made it easier and faster to crack the Caesar cipher.

True

What is the primary flaw with the Caesar Cipher and other substitution ciphers?

With enough frequency, a message could be decrypted

To decrypt an encrypted message, pass the encrypted message and the _____ to the decrypt function.

key

An encryption method that uses a series of interwoven Caesar ciphers based on the letters of a keyword is called

the Vigenère Cipher

Asymmetric encryption:

uses one key for encryption and a different key for decryption

Symmetric encryption:

uses the same key for encryption and decryption


Conjuntos de estudio relacionados

chimie, nomenclature nom usuel et exceptions

View Set

Social Psychology Chapter 9 Prejudice

View Set

fainting, seizure, diabetes study

View Set