Chapter 5: Understanding Techniques for hiding and Scrambling Information
Which of the following encryption algorithms uses 3 key ciphers in a block system and uses the Rijndael algorithm?
128.
How many rounds does DES have?
16.
What is the key length used for DES?
56.
What type of encryption uses a different key to encrypt the message than it uses to decrypt the message?
Asymmetric.
An improvement on the Caesar cipher that uses more than one shift is called a(n)?
Multialphabet substitution.
Which of the following is an asymmetric cryptography algorithm invented by 3 mathematicians in the 1970s?
RSA
The Caesar cipher is the oldest known encryption method?
True.
Which of the following is an example of a multialphabet cipher?
Vignere.
Hiding messages inside another medium is referred to as
steganography.
The most common way steganography is accomplished is via
LSB.
11. In steganography, the is the stream or file into which the data is hidden.
carrier
In steganography, the is the data to be covertly communicated. In other words, it is the message you want to hide.
payload