Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

Match each term according to their meanings in Public-Key Cryptosystem

You can use ____________ to protect your computer from outsiders. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
  2. According to DAD triad, ___________ attempts to defeat availability.
  3. According to the internal structure, word combinations with head element are
  4. Check your vocabulary by matching two antonyms
  5. Classification of phraseological units according to their contextual properties is suggested by
  6. CONSOLIDATION. 1 Match the two halves of the words and translate them.
  7. Courts and Their Functions

Plaintext:

This is the readable message or data that is fed into the algorithm as input.

Encryption algorithm:

The encryption algorithm performs various transformations on the plaintext.

Public and private keys:

This is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption. The exact transformations performed by the algorithm depend on the public or private key that is provided as input.

Ciphertext:

This is the scrambled message produced as output. It depends on the plaintext and the key. For a given message, two different keys will produce two different ciphertexts.

Decryption algorithm:

This algorithm accepts the ciphertext and the matching key and produces the original plaintext.

35. Which of these is NOT considered as a symmetric-key algorithm?

A. RSA

B. Caesar cipher

C. Vigenere Cipher

D. Playfair cipher

E. Hill Cipher

 

36. Which of the following statement(s) is(are) properties of public-key encryption?

A. One of the two keys must be kept secret.

B. The same algorithm with the same key is used for encryption and decryption.

C. One algorithm is used for encryption and decryption with a pair of keys, one for encryption and one for decryption.

D. The sender and receiver must share the algorithm and the key.

E. The sender and receiver must each have one of the matched pair of keys(not the same one).

 


Дата добавления: 2015-08-18; просмотров: 131 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
A stateful firewall maintains a ______________, which is a list of active connections.| The process of verifying and identity claimed by or for a system entity.

mybiblioteka.su - 2015-2024 год. (0.008 сек.)