Cryptography (SEC-310-0) QUESTION AND ANSWERS 100%
0 view 0 purchase
Course
- Cryptography
Institution
- Cryptography
Selected Answer: Answers:
Asymmetric encryption
Symmetric encryption Data integrity algorithms
Asymmetric encryption Authentication protocols
Question 8
2 out of 2 points
The essential elements of any pseudorandom number generator are a and a deterministic algorithm...
8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930
College of Technolo g
y
H
Review Test Submission: Week 4 Midterm Exam
User Ilhan Gocmez
Course Summer 2019 - Cryptography (SEC-310-0) Week
Test 4 Midterm Exam
Started 7/31/19 6:03 PM
Submitted 7/31/19 8:42 PM
Status Completed
Attempt 102 out of 100 points
Score
Time 2 hours, 39 minutes
Elapsed
Instructions Please complete the Midterm Exam. The midterm exam covers the content covered in Weeks 1-4. The Mid-term Exam is open book and consists of short answer and
multiple choice questions. Use the textbook and resources found on this Blackboard course.
DES exhibits the classic block cipher structure, which consists of a number of identical rounds of processing.
Selected
Feiste
Answer:
l
Answers:
Feiste
l
SAC
Shanno
n
Rendell
Question 2
2 out of 2 points
The was used as the standard field system by the British Army in World War I and was used by the U.S. Army and other Allied forces
during World War II.
Selected
Playfair
Answer:
cipher Caesar
Answers:
cipher
Playfair cipher
Hill cipher
Rail Fence cipher
Question 3 2 out of 2 points
techniques map plaintext elements (characters, bits) into ciphertext elements
Selected
Substituti
Answer:
on
Answers:
Transposition
Traditional
Substituti
,8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930
The appeal of is that its designers have been able to prove an exact relationship between the strength of the embedded hash
function and the strength of this form of authentication.
is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.
Selected
Asymmetric encryption
Answer:
Symmetric
Answers: encryption Data
integrity algorithms
Asymmetric
encryption
Authentication
protocols
Question 8
2 out of 2 points
The essential elements of any pseudorandom number generator are a and a deterministic algorithm for generating a stream of pseudorandom bits.
Selected
seed
Answer:
value secret
Answers:
key session
key
seed value
stream encryption function
Question 9 2 out of 2 points
The indicates that the subscriber identified in the certificate has sole control and access to the private key
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller makish. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.49. You're not tied to anything after your purchase.