100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
WGU C839 - Introduction to Cryptography Actual Exam With 100% Correct Verified Answer €11,22   In winkelwagen

Tentamen (uitwerkingen)

WGU C839 - Introduction to Cryptography Actual Exam With 100% Correct Verified Answer

 4 keer bekeken  0 keer verkocht
  • Vak
  • WGU C839 - Introduction to Cryptography Actual Ex
  • Instelling
  • WGU C839 - Introduction To Cryptography Actual Ex

WGU C839 - Introduction to Cryptography Actual Exam With 100% Correct Verified AnswerAllows encryption of partial blocks ---------- Correct Answer -------- Cipher Feedback (CFB) Mode Generates keystream blocks that are XORed with the PT blocks Turns block Cipher to stream Cipher ---------- ...

[Meer zien]

Voorbeeld 3 van de 21  pagina's

  • 27 september 2023
  • 21
  • 2023/2024
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • WGU C839 - Introduction to Cryptography Actual Ex
  • WGU C839 - Introduction to Cryptography Actual Ex
avatar-seller
WGU C839 - Introduction to Cryptography Actual Exam With 100% Correct Verified Answer Feistel cipher ---------- Correct Answer -------- DES (Data Encryption Standard) Fixed sizes of random or pseudorandom, non repeating nonce ---------- Correct Answer -
------- Initialization Vector (IV) Symmetric Block Cipher Block Size: 128 bits Key Size: 128, 192 256 bits Rounds: 10, 12, 14 Network: Substitution Permutation ---------- Correct Answer -------- AES (Advance Encryption Standard) Symmetric Block Cipher Block Size: 64 bits Key Size: 128 bits ---------- Correct Answer -------- IDEA (International Data Encryption Algorithm) Symmetric Block Cipher Block Size: 64 bit blocks Key Size: 40 to 128 bits Two versions: 128 and 256 ---------- Correct Answer -------- CAST 128/256 Each block is encrypted independently but identical plaintext blocks are encrypted into identical ciphertext blocks IV is used on the first block ---------- Correct Answer -------- Electronic Codebook (ECB) Each block of plaintext is XORed with the with the previous ciphertext block before being encrypted IV is used on the first block ---------- Correct Answer ------- - Cipher Block Chaining (CBC) Each block of PT is XORed with the XOR of the previous PT block AND the previous CT block before being encrypted ---------- Correct Answer -------- Propagating Cipher Block Chaining (PCBC) Allows encryption of partial blocks ---------- Correct Answer -------- Cipher Feedback (CFB) Mode Generates keystream blocks that are XORed with the PT blocks Turns block Cipher to stream Cipher ---------- Correct Answer -------- Output Feedback (OFB) Turns block cipher into stream ciphe r like OFB, It generates the next keystream block by encrypting successive values of a counter -----
----- Correct Answer -------- Counter (CTR) Is a number that has no factors in common with another number ---------- Correct Answer -------- Co-Prime Num bers Software based stream cipher Vulnerable to known plaintext attacks. ---------- Correct Answer -------- FISH (FIbonacci Shrinking) Random bits that are used as one of the input to the hash. ---------- Correct Answer ------
-- Hash Salt Hashing Algorithm Hash Size: 128 Bits Block Processing: 512 Bits specified by RFC 1321 The length of the message (before padding) is then appended as the last 64 bits of the message ---------- Correct Answer -------- MD5 (Message Digest 5) • SHA -1 160 bit hash function similar to MD5. Designed by NSA • SHA -2 Consists of SHA 224, 256, 384, and 512. They differ in word sizes but 512 bit blocks • SHA -3 still in development. Should be complete by NIST by 2012. ---------- Correct Answer -------- SHA (Secure Hash Algorithm) • Uses 512 -bit blocks • Each block is hashed into 256 bit blocks in p arallel. • Still under review and not widespread. ---------- Correct Answer -------- FORK -256 Has 128, 256 and 320 bit versions. More secure than MD5 ---------- Correct Answer ------
-- RIPEMD -160 (RACE Integrity Primitives Evaluation Message Digest) 192 bit hash function Collision resistant design ---------- Correct Answer -------- Tiger Add a key to the has to improve integrity. Uses block cipher in CBC and salt ---------- Correct Answer -------- MAC and HMAC • Also called Public Key Cryptography • Uses key pairs which consist of a public key and private key • The public key is made pu blic and the private key is kept secret • The public key is used to encrypt messages and only the recipient's private key can decrypt them ---------- Correct Answer -------- Asymmetric Cryptography Table Look Up Hardware Software ---------- Correct Answe r -------- Types of Random Number Generators Counts the positive integers up to a given integer n that are co -prime to n ---------- Correct Answer -------- Eulers Totient Symmetric Block Cipher Block Size: 128 bits Key Size: 128, 192, or 256 bits Rounds: 32 Network: Substitution -Permutation ---------- Correct Answer -------- Serpent Symmetric Block Cipher Block Size: 64 bits Key Size: 128 bits ---------- Correct Answer -------- Tiny Encryption Algorithm (TEA) Deciphering secret writings, kryptos means hidde n and grafo means write. Must not be readable by interlopers over secure/hidden communications. Readable by intended recipients only. ---------- Correct Answer -------- Cryptography Include Ceasar, Atbash, Affine and ROT13 ---------- Correct Answer -------- Mono -
Alphabet Substitution Algorithms Is one of the oldest methods, was used by ancient Romans. Shift of letter. Easy to crack to common words like "A" and "The". ---------- Corre ct Answer -------- Caeser Cipher

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper nyakiosynthia01. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €11,22. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 79223 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€11,22
  • (0)
  Kopen