ABC's of Cryptography code HS

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

20 + (35 (mod 11))

22

Pretend that it's 7:00 now. In 33 hours, what time will the clock show? Don't worry about AM/PM.

4:00

Why do we use cryptography? To secure digital and non-digital data To allow important messages to be sent with lower chances of being interpreted To add security to the use of specific machinery All of the above

All of the above

Which of the following methods are effective in cracking the Caesar cipher? Brute force only Letter frequency analysis only Brute force and letter frequency analysis Neither-the Caesar cipher is too difficult to crack.

Brute force and letter frequency analysis

Encrypted information is only viewable by authorized users who have the correct key to decrypt. This describes which aspect of the CIA triad?

Confidentiality

Encrypted information is only viewable by authorized users who have the correct key to decrypt. This describes which aspect of the CIA triad? Confidentiality Integrity Availability Security

Confidentiality

Encryption plays a crucial role in maintaining which part(s) of the CIA triad? Confidentiality Integrity Availability Confidentiality and Integrity Integrity and Availability Confidentiality and Availability

Confidentiality and Integrity

Protecting data by hashing the data with a hashing function addresses which part of the CIA triad?

Confidentiality and Integrity

Which of the following shows the word "CAT" encrypted with the Caesar cipher with a key of 1? DBU CAT BZS Can not be encrypted.

DBU

True or False: A message in unencrypted form is called ciphertext. True False

False

True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method for cracking the encryption. True False

False

Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: I. It is computationally infeasible to compute the private key based on the public key. II. It's easier to share one public key than billions of private keys. III. It's much tougher to crack an asymmetric encryption than a symmetric one. IV. It's more secure because the private keys do not ever need to be transmitted or revealed to anyone.

I - IV all

Most attacks on hash functions involve: I. Finding collisions. II. Injecting a new hash function into the code. III. Pre-generating millions of hashes and comparing them to the plain text that generated it. IV. Really good random guessing.

I, II and III

Public-key encryption is widely used because: I. It is computationally infeasible to compute the private key based on the public key. II. It's easy to implement because it is a form of symmetric key encryption. III. It's easier to share one public key than billions of private keys. IV. It's much tougher to crack an asymmetric encryption than a symmetric one. V. It's more secure because the private keys do not ever need to be transmitted or revealed to anyone.

I, III, IV, and V

Cryptography is defined as: The practice of encoding information so only authorized people can read it Sensitive information sent over networks that needs to be secured Verified authority to view information, such as a password or key The act of stealing personal information online

The practice of encoding information so only authorized people can read it

True or False: Computers have made it easier and faster to crack the Caesar cipher. True False

True

What is the primary flaw with the Caesar Cipher and other substitution ciphers? It could not be applied to all messages With enough frequency, a message could be decrypted It could only be used in English There were too many options when encrypting a message

With enough frequency, a message could be decrypted

To decrypt an encrypted message, pass the encrypted message and the _____ to the decrypt function. cryptology decrypted message key ciphertext

key

Asymmetric encryption: uses one key for encryption and a different key for decryption uses the same key for encryption and decryption doesn't use any keys at all

uses one key for encryption and a different key for decryption

Symmetric encryption: uses one key for encryption and a different key for decryption uses the same key for encryption and decryption doesn't use any keys at all

uses the same key for encryption and decryption


संबंधित स्टडी सेट्स

org comm exam 4 1-10Because emotional contagion can lead to burnout, researchers suggest that caregivers learn and practice a. muscle relaxation. b. parallel responses. c. empathic concern. (*) (pp. 206-208) d. emotion-centered coping. e. none of the abo

View Set

Honors Geology Test 2 - Chapter 17 Practice

View Set

Prep U 3 - management of patients with kidney disorders

View Set

Pathophysiology Chapter 16 Endocrine System Disorders

View Set