Студопедия
Случайная страница | ТОМ-1 | ТОМ-2 | ТОМ-3
АрхитектураБиологияГеографияДругоеИностранные языки
ИнформатикаИсторияКультураЛитератураМатематика
МедицинаМеханикаОбразованиеОхрана трудаПедагогика
ПолитикаПравоПрограммированиеПсихологияРелигия
СоциологияСпортСтроительствоФизикаФилософия
ФинансыХимияЭкологияЭкономикаЭлектроника

The best-known multiple-letter encryption cipher, which treats digrams in the plaintext as single units and translates these units into ciphertext digrams

You can use ____________ to protect your computer from outsiders. | A stateful firewall maintains a ______________, which is a list of active connections. | Match each term according to their meanings in Public-Key Cryptosystem | The process of verifying and identity claimed by or for a system entity. | Decipher the message YITJPG using the Hill cipher with the inverse key Take the indices of letters according to the given table. DIFFIC | A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption. | An attacker alters his identity so that someone thinks he is someone else | According to DAD triad, ___________ attempts to defeat availability. | The quality or state of having ownership or control of some object or item. | Personal Firewall |


Читайте также:
  1. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
  2. A stateful firewall maintains a ______________, which is a list of active connections.
  3. A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers.
  4. An Amazing Design E 2. The Mysterious Artist D 3. Sculpture Balanced On A Single Feather 0 4. The Unusual Tool A 5. An Edible Painting C 6. A Wall as a Canvas B
  5. Ask tag questions to these sentences
  6. Classification of phraseological units according to their contextual properties is suggested by
  7. Consider the following statements and say if you agree or disagree with them. Use the introductory phrases given in the previous Units.

A. Playfair cipher

B. Hill cipher

C. Caesar Cipher

D. Feistel Cipher

E. RSA

 

102. Using this Playfair matrix <br/> <br/> encrypt the message: Cadogans TGTUERVF

103. Using this Playfair matrix <br/> <br/> decipher the message: UZTB MUST

104. The Vigenere cipher is which of the following types:

A. Polyaplhabetic

B. Monoalphabetic

C. Dialphabetic

D. Asymmetric

E. None of the statements

 

105. Use the Playfair cipher with the keyword "PLAYFAIR" to encrypt the message "GOTO”. OVNQ

106. Use the Playfair cipher with the keyword "PLAYFAIR" to decrypt the message "YPYQ”. AFAS

107. Decipher the message IAIWWT using the Hill cipher with the inverse key. <br/>Take the indices of letters according to the given table. ONALLY

108. Perform encryption using the RSA algorithm, if p = 3; q = 11, e = 7; M = 5. 14

109. Find d using the RSA algorithm, if p = 3; q = 11, e = 7; M = 5. 3

110. Perform decryption using the RSA algorithm, if p = 5; q = 11, e = 3; C = 14. 9

111. Find d using the RSA algorithm, if p = 5; q = 11, e = 3; M = 9. 27

112. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the plaintext M? 5

113. In a public-key system using RSA, you intercept the ciphertext C = 10 sent to a user whose public key is e = 5, n = 35. What is the value of d? 5

114. If a key is 8 bits long, how many possible numbers that the key can generate? 256

115. An attack on the key by attempting all possible combinations is called:

A. A brute force attack

B. An all combinations attack

C. A cryptographic key attack

D. A random key attack

E. A systematic seed attack

 

116. The word “asymmetric” in public-key cryptography means:

A. The algorithm to encrypt is the same with the algorithm to decrypt

B. The algorithm to encrypt is different from the algorithm to decrypt

C. The key to encrypt is the same with the key to decrypt

D. The key to encrypt is different from the key to decrypt

E. None of the listed answers

 

117. Which of the following statements is TRUE?

A. Public-key algorithms are used to encrypt the message

B. Public-key algorithms are slow compared to symmetric cryptography

C. Public-key algorithms are used to encrypt the key encryption key

D. Public key algorithms are used to hash the password

E. None of the listed answers

 

118. Which of the following statement is NOT TRUE?

A. A user will have his/her own public key

B. A user will have his/her own private key

C. A user does not have to protect his/her public key

D. A user must protect his/her public key

E. A user must remember his/her password that encrypts the public key

 

119. Which of the following statement is NOT TRUE?

A. The foundation of public-key algorithm is a one way function

B. The private key operates as a trap door that allows the owner to recover the original data

C. The public-key can be used to derive the private key

D. Reversing the process of encryption is virtually impossible without the private key

 

 

E. All of the listed answers are TRUE

 

120. Which of the following statement is NOT TRUE?

A. Asymmetric cryptography is also known as public key cryptography

B. Asymmetric cryptography is a form of cryptography in which a user has a pair of cryptographic keys

C. The public key is kept secret while the private key may be widely distributed

D. The private key cannot be practically derived from the public key

E. The public key and private key are mathematically related

 

121. Which of the statement is TRUE?

A. The larger the key size, the greater the range of possible values a key can be.

 

B. The smaller the key size, the greater the range of possible values a key can be.

C. The larger the key size, the smaller the range of possible values a key can be.

D. The larger the key size, the range of possible values a key can be remains the same.

E. The smaller the key size, the range of possible values a key can be remains the same.


Дата добавления: 2015-08-18; просмотров: 159 | Нарушение авторских прав


<== предыдущая страница | следующая страница ==>
Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers.| A two-letter sequence. In English and other languages, the relative frequency of various _________ in plaintext can be used in the cryptanalysis of some ciphers.

mybiblioteka.su - 2015-2024 год. (0.006 сек.)