Wednesday, November 6, 2019

Chapter Essays

Chapter Essays Chapter Essay Chapter Essay False 10 True or False: Hashing is a mechanism for accomplishing confidentiality, 11 What is the a cipher that shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A? Caesar Cipher 12 Identify a security objective that stops authorization for access to data. Revocation 3 True or False: Revocation is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses. 4 True or False: Authorization is a security objective that binds a message or 15 True or F-else: Timestamp is a security objective that binds a message or 16 True or False: Message authentication is a security objective that binds a message or data to a specific entity and adds value to relationships between businesses. False 17 In which type Of cipher attack does the cryptanalyst have access only to segment of encrypted data, and has no choice as to what that data may be. An example is the cryptogram in some daily newspapers. Ciphered;only attack (COCA) 18 In which type of cipher attack can the cryptanalyst encrypt any information and observe the output, which offers the most flexibility and insight into HTH encryption mechanism. Chosen-plaintext attack 19 What type of cipher replaces bits, characters, or blocks of information w other bits, characters, or blocks? Substitution ciphers 20 Every cipher and any plaintext you want to encrypt needs a . Key 21 True or False: An objective of cryptanalysis is, in general, to derive the plaintext of a target message. True 2 True or False: An objective of cryptanalysis is, in general, to determine TFH- key used to encrypt a target message. True 23 True or False: An objective of cryptanalysis is, in general, to derive the algorithm used by a particular cipher. True 24 True or False: An objective of cryptanalysis is, in general, to determine try types of attacks that could be launched against the message. False 25 True Or False: A method for maintaining the security Of a substitution cipher is to make sure the key is a random sequence without repetition. Trim 26 True or False: A method for maintaining the security of a substitution piper is to make sure the key is as long as the encrypted information. True 27 True or False: A method for maintaining the security of a substitution cipher is to make sure the key is shorter than the encrypted information. 28 True or False: A method for maintaining the security of a substitution cipher is to use the key only once. True 29 What is an advantage of asymmetric key ciphers versus symmetric key ciphers? 30 What is a common asymmetric algorithm?

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.