CIS 565 CRYPTOGRAPHY EXAM WITH ANSWERS (2021) STRAYER
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
CIS 565 CRYPTOGRAPHY EXAM WITH ANSWERS (2021)
STRAYER
BUY HERE⬊
https://www.seetutorials.com/cis-565-
cryptography-exam-with-answers-2021-
strayer/
1. An original intelligible message fed into the algorithm as input is known as _________ , while the coded
message produced as output is called the __________ .
2. Division requires that each nonzero element have a(n) __________ inverse.
3. Public-key algorithms are based on __________ .
4. In Advanced Encryption Standard all operations are performed on __________ bytes.
5. A common technique for masking contents of messages or other information traffic so that opponents can not
extract the information from the message is __________ .
6. Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that is as long as
the message so that the key does not need to be repeated. The key is used to encrypt and decrypt a single
message and then is discarded. Each new message requires a new key of the same length as the new
message. This scheme is known as a(n) __________ .
7. If a secret key is to be used as a _________ for conventional encryption a single number must be generated.
8. The __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.
9. DES exhibits the classic __________ block cipher structure, which consists of a number of identical rounds of
processing.
10. _____________ is the collection of tools, policies, security concepts, security
11. A sequence of plaintext elements is replaced by a __________ of that sequence which
12. Another important mode, XTS-AES, has been standardized by the __________ Security in Storage Working
Group.
13. The AES cipher begins and ends with a(n) _________ stage because any other stage, applied at the beginning
or end, is reversible without knowledge of the key and would add no security.
14. The __________ indicates that the subscriber identified in the certificate has sole control and access to the
private key
15. A public-key encryption scheme has __________ ingredients.
16. _________ is a branch of mathematics that deals with the transformation of data.
17. Plaintext is recovered from the ciphertext using the paired key and _____________ .
18. Public-key encryption is also known as ___________ .
19. A __________ is a set in which you can do addition, subtraction, multiplication and division without leaving the
set.
20. __________ involves the passive capture of a data unit and its subsequent retransmission to produce an
unauthorized effect.
21. ____________ makes use of elliptic curves in which the variables and coefficients
22. A __________ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext
block of equal length.
23. A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is
obtained.
24. The _________ and _________ block cipher modes of operation are used for
25. The Advanced Encryption Standard was published by the __________ in 2001.