CTNC Exam Questions & Answers 2024/2025
allows you to maintain confidentiality of data by converting plain text information into cipher text - ANSWERSEncryption
Method of cryptography that involves substituting one character for another. - ANSWERSSubstitution Cipher
Method of cryptograph...
allows you to maintain confidentiality of data by converting plain text information into cipher text -
ANSWERSEncryption
Method of cryptography that involves substituting one character for another. - ANSWERSSubstitution
Cipher
Method of cryptography that involves substituting one character for another. - ANSWERSTransposition
Cipher
used to maintain the integrity of the information. goal is to prove that the information has not been
altered - ANSWERSHashing
This services is a method for cryptography to prove the creator, or the sender of information, is who it
says it is. - ANSWERSAuthentication
the mathematical operation performed on the data to convert the data from plain text to cipher text (or
vice versa). - ANSWERSAlgorithm
a variable piece of information that is used by the encryption algorithm to perform the encryption or
decryption of the data. - ANSWERSKey
algorithms encrypt data one bit at a time. - ANSWERSStream Cipher
algorithms encrypt data in blocks. - ANSWERSBlock Cipher
ones, all zeros, or a combination of ones and zeros must be added to the last block to complete the data
stream. - ANSWERSPadding
, if one, and only one, of two bits being compared has a value of 1, then the result is a 1 for that
calculated bit. - ANSWERSXOR
common encryption method that involves using the same key to encrypt and decrypt the message. -
ANSWERSSymmetric encryption
name stems from the fact that you need to share the key with the person who is going to decrypt the
information. - ANSWERSpreshared key
name comes from the fact that you must keep the key secret from others who should not decrypt the
information. - ANSWERSSecret key
name comes from the fact that many implementations of symmetric encryption use a random key,
known as a session key to do the encryption/decryption. - ANSWERSSession Key
name comes from the fact that you need to keep the key private to only the parties who are to decrypt
the information; otherwise, you lose confidentiality. - ANSWERSPrivate key
block cipher. 56-bit encryption algorithm. It is not considered secure. - ANSWERSData Encryption
Standard (DES)
block cipher algorithm to replace the DES algorithm. It offers variable rates of encryption, from 1- to 448-
bit encryption. - ANSWERSBlowfish
created after Blowfish and offers 128-bit encryption. - ANSWERSTwofish
RC5 is a block cipher. RC4, which is a stream cipher used in SSL and WEP. - ANSWERSRivest Cipher
replaced 3DES as the new standard for symmetric encryption algorithms. block cipher that supports 128-
bit, 192-bit, and 256-bit encryption. - ANSWERSAdvanced Encryption Standard (AES)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Bensuda. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.99. You're not tied to anything after your purchase.