ABC's of Cryptography code HS
20 + (35 (mod 11))
22
Pretend that it's 7:00 now. In 33 hours, what time will the clock show? Don't worry about AM/PM.
4:00
Why do we use cryptography? To secure digital and non-digital data To allow important messages to be sent with lower chances of being interpreted To add security to the use of specific machinery All of the above
All of the above
Which of the following methods are effective in cracking the Caesar cipher? Brute force only Letter frequency analysis only Brute force and letter frequency analysis Neither-the Caesar cipher is too difficult to crack.
Brute force and letter frequency analysis
Encrypted information is only viewable by authorized users who have the correct key to decrypt. This describes which aspect of the CIA triad?
Confidentiality
Encrypted information is only viewable by authorized users who have the correct key to decrypt. This describes which aspect of the CIA triad? Confidentiality Integrity Availability Security
Confidentiality
Encryption plays a crucial role in maintaining which part(s) of the CIA triad? Confidentiality Integrity Availability Confidentiality and Integrity Integrity and Availability Confidentiality and Availability
Confidentiality and Integrity
Protecting data by hashing the data with a hashing function addresses which part of the CIA triad?
Confidentiality and Integrity
Which of the following shows the word "CAT" encrypted with the Caesar cipher with a key of 1? DBU CAT BZS Can not be encrypted.
DBU
True or False: A message in unencrypted form is called ciphertext. True False
False
True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method for cracking the encryption. True False
False
Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: I. It is computationally infeasible to compute the private key based on the public key. II. It's easier to share one public key than billions of private keys. III. It's much tougher to crack an asymmetric encryption than a symmetric one. IV. It's more secure because the private keys do not ever need to be transmitted or revealed to anyone.
I - IV all
Most attacks on hash functions involve: I. Finding collisions. II. Injecting a new hash function into the code. III. Pre-generating millions of hashes and comparing them to the plain text that generated it. IV. Really good random guessing.
I, II and III
Public-key encryption is widely used because: I. It is computationally infeasible to compute the private key based on the public key. II. It's easy to implement because it is a form of symmetric key encryption. III. It's easier to share one public key than billions of private keys. IV. It's much tougher to crack an asymmetric encryption than a symmetric one. V. It's more secure because the private keys do not ever need to be transmitted or revealed to anyone.
I, III, IV, and V
Cryptography is defined as: The practice of encoding information so only authorized people can read it Sensitive information sent over networks that needs to be secured Verified authority to view information, such as a password or key The act of stealing personal information online
The practice of encoding information so only authorized people can read it
True or False: Computers have made it easier and faster to crack the Caesar cipher. True False
True
What is the primary flaw with the Caesar Cipher and other substitution ciphers? It could not be applied to all messages With enough frequency, a message could be decrypted It could only be used in English There were too many options when encrypting a message
With enough frequency, a message could be decrypted
To decrypt an encrypted message, pass the encrypted message and the _____ to the decrypt function. cryptology decrypted message key ciphertext
key
Asymmetric encryption: uses one key for encryption and a different key for decryption uses the same key for encryption and decryption doesn't use any keys at all
uses one key for encryption and a different key for decryption
Symmetric encryption: uses one key for encryption and a different key for decryption uses the same key for encryption and decryption doesn't use any keys at all
uses the same key for encryption and decryption