ESAT Forouzan - Chapter 29: Cyrptography Flashcards

1
Q

Before a message is encrypted, it is called _______.
a. Plaintext
b. Ciphertext
c. Cryptotext
d. Cryptonite

A

a. Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

After a message is decrypted, it is called _______.
a. Plaintext
b. Ciphertext
c. Cryptotext
d. Cryptonite

A

a. Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A cipher is _______.
a. An encryption algorithm
b. A decryption algorithm
c. A private key
d. (a) or (b)

A

d. (a) or (b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In the symmetric-key method of cryptography, which key is publicly known?
a. Encryption key only
b. Decryption key only
c. Both
d. None of the Above

A

d. None of the Above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

If 20 people need to communicate using symmetric-key cryptography, ____ symmetric keys are needed.
a. 19
b. 20
c. 190
d. 200

A

c. 190

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The _______ is an example of polyalphabetic substitution.
a. P-box
b. S-box
c. Product block
d. Vigenere cipher

A

d. Vigenere cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The _________ is a block cipher.
a. P-box
b. S-box
c. Product block
d. All the above

A

d. All the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

We use a cryptography method in which the character Z always substitutes for the character G. This is probably ___________.
a. Monoalphabetic substitution
b. Polyalphabetic substitution
c. Transpositional
d. None of the Above

A

a. Monoalphabetic substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

We use a cryptography method in which the plaintext AAAAAA becomes the ciphertext BCDEFG. This is probably ____________.
a. Monoalphabetic substitution
b. Polyalphabetic substitution
c. Transposition
d. None of the Above

A

b. Polyalphabetic substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One way to encrypt and decrypt long messages is through the use of the _______.
a. ECB mode
b. CBC mode
c. CFM
d. All of the Above

A

d. All of the Above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An initialization vector is needed in the _____________.
a. CSM
b. CBC mode
c. CVF
d. a and b

A

d. a and b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the __________, the encryption of each 8-byte block is independent of the other
a. ECB mode
b. CBC mode
c. CVF
d. CSM

A

a. ECB mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In the public key method of cryptography, which key is publicly known?
a. Encryption key only
b. Decryption key only
c. Both
d. None of the Above

A

a. Encryption key only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

In the public-key method of cryptography, only the receiver has possession of the __________.
a. Private key
b. Public key
c. Both keys
d. None of the Above

A

a. Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The RSA algorithm uses a __________ cryptography method.
a. Public-key
b. Private-key
c. Symmetric-key
d. Denominational

A

a. Public-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly