ESAT Forouzan - Chapter 29: Cyrptography Flashcards
Before a message is encrypted, it is called _______.
a. Plaintext
b. Ciphertext
c. Cryptotext
d. Cryptonite
a. Plaintext
After a message is decrypted, it is called _______.
a. Plaintext
b. Ciphertext
c. Cryptotext
d. Cryptonite
a. Plaintext
A cipher is _______.
a. An encryption algorithm
b. A decryption algorithm
c. A private key
d. (a) or (b)
d. (a) or (b)
In the symmetric-key method of cryptography, which key is publicly known?
a. Encryption key only
b. Decryption key only
c. Both
d. None of the Above
d. None of the Above
If 20 people need to communicate using symmetric-key cryptography, ____ symmetric keys are needed.
a. 19
b. 20
c. 190
d. 200
c. 190
The _______ is an example of polyalphabetic substitution.
a. P-box
b. S-box
c. Product block
d. Vigenere cipher
d. Vigenere cipher
The _________ is a block cipher.
a. P-box
b. S-box
c. Product block
d. All the above
d. All the above
We use a cryptography method in which the character Z always substitutes for the character G. This is probably ___________.
a. Monoalphabetic substitution
b. Polyalphabetic substitution
c. Transpositional
d. None of the Above
a. Monoalphabetic substitution
We use a cryptography method in which the plaintext AAAAAA becomes the ciphertext BCDEFG. This is probably ____________.
a. Monoalphabetic substitution
b. Polyalphabetic substitution
c. Transposition
d. None of the Above
b. Polyalphabetic substitution
One way to encrypt and decrypt long messages is through the use of the _______.
a. ECB mode
b. CBC mode
c. CFM
d. All of the Above
d. All of the Above
An initialization vector is needed in the _____________.
a. CSM
b. CBC mode
c. CVF
d. a and b
d. a and b
In the __________, the encryption of each 8-byte block is independent of the other
a. ECB mode
b. CBC mode
c. CVF
d. CSM
a. ECB mode
In the public key method of cryptography, which key is publicly known?
a. Encryption key only
b. Decryption key only
c. Both
d. None of the Above
a. Encryption key only
In the public-key method of cryptography, only the receiver has possession of the __________.
a. Private key
b. Public key
c. Both keys
d. None of the Above
a. Private key
The RSA algorithm uses a __________ cryptography method.
a. Public-key
b. Private-key
c. Symmetric-key
d. Denominational
a. Public-key