Читайте также:
|
|
A. Playfair cipher
B. Hill cipher
C. Caesar Cipher
D. Feistel Cipher
E. RSA
102. Using this Playfair matrix <br/> <br/> encrypt the message: Cadogans TGTUERVF
103. Using this Playfair matrix <br/> <br/> decipher the message: UZTB MUST
104. The Vigenere cipher is which of the following types:
A. Polyaplhabetic
B. Monoalphabetic
C. Dialphabetic
D. Asymmetric
E. None of the statements
105. Use the Playfair cipher with the keyword "PLAYFAIR" to encrypt the message "GOTO”. OVNQ
106. Use the Playfair cipher with the keyword "PLAYFAIR" to decrypt the message "YPYQ”. AFAS
107. Decipher the message IAIWWT using the Hill cipher with the inverse key. <br/>Take the indices of letters according to the given table. ONALLY
108. Perform encryption using the RSA algorithm, if p = 3; q = 11, e = 7; M = 5. 14
109. Find d using the RSA algorithm, if p = 3; q = 11, e = 7; M = 5. 3
110. Perform decryption using the RSA algorithm, if p = 5; q = 11, e = 3; C = 14. 9
111. Find d using the RSA algorithm, if p = 5; q = 11, e = 3; M = 9. 27
112. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M? 5
113. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the value of d? 5
114. If a key is 8 bits long, how many possible numbers that the key can generate? 256
115. An attack on the key by attempting all possible combinations is called:
A. A brute force attack
B. An all combinations attack
C. A cryptographic key attack
D. A random key attack
E. A systematic seed attack
116. The word “asymmetric” in public-key cryptography means:
A. The algorithm to encrypt is the same with the algorithm to decrypt
B. The algorithm to encrypt is different from the algorithm to decrypt
C. The key to encrypt is the same with the key to decrypt
D. The key to encrypt is different from the key to decrypt
E. None of the listed answers
117. Which of the following statements is TRUE?
A. Public-key algorithms are used to encrypt the message
B. Public-key algorithms are slow compared to symmetric cryptography
C. Public-key algorithms are used to encrypt the key encryption key
D. Public key algorithms are used to hash the password
E. None of the listed answers
118. Which of the following statement is NOT TRUE?
A. A user will have his/her own public key
B. A user will have his/her own private key
C. A user does not have to protect his/her public key
D. A user must protect his/her public key
E. A user must remember his/her password that encrypts the public key
119. Which of the following statement is NOT TRUE?
A. The foundation of public-key algorithm is a one way function
B. The private key operates as a trap door that allows the owner to recover the original data
C. The public-key can be used to derive the private key
D. Reversing the process of encryption is virtually impossible without the private key
E. All of the listed answers are TRUE
120. Which of the following statement is NOT TRUE?
A. Asymmetric cryptography is also known as public key cryptography
B. Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys
C. The public key is kept secret while the private key may be widely distributed
D. The private key cannot be practically derived from the public key
E. The public key and private key are mathematically related
121. Which of the statement is TRUE?
A. The larger the key size, the greater the range of possible values a key can be.
B. The smaller the key size, the greater the range of possible values a key can be.
C. The larger the key size, the smaller the range of possible values a key can be.
D. The larger the key size, the range of possible values a key can be remains the same.
E. The smaller the key size, the range of possible values a key can be remains the same.
Дата добавления: 2015-08-18; просмотров: 159 | Нарушение авторских прав
<== предыдущая страница | | | следующая страница ==> |
Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers. | | | A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers. |