27.05.2021 Views

CIS 565 CRYPTOGRAPHY EXAM WITH ANSWERS (2021) STRAYER

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CIS 565 CRYPTOGRAPHY EXAM WITH ANSWERS (2021)

STRAYER

BUY HERE⬊

https://www.seetutorials.com/cis-565-

cryptography-exam-with-answers-2021-

strayer/

1. An original intelligible message fed into the algorithm as input is known as _________ , while the coded

message produced as output is called the __________ .

2. Division requires that each nonzero element have a(n) __________ inverse.

3. Public-key algorithms are based on __________ .

4. In Advanced Encryption Standard all operations are performed on __________ bytes.

5. A common technique for masking contents of messages or other information traffic so that opponents can not

extract the information from the message is __________ .

6. Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that is as long as

the message so that the key does not need to be repeated. The key is used to encrypt and decrypt a single

message and then is discarded. Each new message requires a new key of the same length as the new

message. This scheme is known as a(n) __________ .

7. If a secret key is to be used as a _________ for conventional encryption a single number must be generated.

8. The __________ cryptosystem is used in some form in a number of standards including DSS and S/MIME.

9. DES exhibits the classic __________ block cipher structure, which consists of a number of identical rounds of

processing.

10. _____________ is the collection of tools, policies, security concepts, security

11. A sequence of plaintext elements is replaced by a __________ of that sequence which

12. Another important mode, XTS-AES, has been standardized by the __________ Security in Storage Working

Group.

13. The AES cipher begins and ends with a(n) _________ stage because any other stage, applied at the beginning

or end, is reversible without knowledge of the key and would add no security.

14. The __________ indicates that the subscriber identified in the certificate has sole control and access to the

private key

15. A public-key encryption scheme has __________ ingredients.

16. _________ is a branch of mathematics that deals with the transformation of data.

17. Plaintext is recovered from the ciphertext using the paired key and _____________ .

18. Public-key encryption is also known as ___________ .

19. A __________ is a set in which you can do addition, subtraction, multiplication and division without leaving the

set.

20. __________ involves the passive capture of a data unit and its subsequent retransmission to produce an

unauthorized effect.

21. ____________ makes use of elliptic curves in which the variables and coefficients

22. A __________ cipher is one in which a block of plaintext is treated as a whole and used to produce a ciphertext

block of equal length.

23. A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is

obtained.

24. The _________ and _________ block cipher modes of operation are used for

25. The Advanced Encryption Standard was published by the __________ in 2001.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!