Chapter 5: Understanding Techniques for hiding and Scrambling Information

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following encryption algorithms uses 3 key ciphers in a block system and uses the Rijndael algorithm?

128.

How many rounds does DES have?

16.

What is the key length used for DES?

56.

What type of encryption uses a different key to encrypt the message than it uses to decrypt the message?

Asymmetric.

An improvement on the Caesar cipher that uses more than one shift is called a(n)?

Multialphabet substitution.

Which of the following is an asymmetric cryptography algorithm invented by 3 mathematicians in the 1970s?

RSA

The Caesar cipher is the oldest known encryption method?

True.

Which of the following is an example of a multialphabet cipher?

Vignere.

Hiding messages inside another medium is referred to as

steganography.

The most common way steganography is accomplished is via

LSB.

11. In steganography, the is the stream or file into which the data is hidden.

carrier

In steganography, the is the data to be covertly communicated. In other words, it is the message you want to hide.

payload


Ensembles d'études connexes

PREPU CHAPTER 31 SKIN INTEGRITY & WOUND CARE

View Set

BIO 172, CH. 30 Reproduction and Demestication of Flowering Plants

View Set

Nebraska Life & Health - Chapter Flashcards

View Set

Reliability and Validity of Measures

View Set

Holocaust: PERPETRATORS, COLLABORATORS, AND BYSTANDERS

View Set

The Lymphatic System and Lymphoid Organs and Tissues

View Set