Lecture 8 Flashcards
cryptography and Symmetric key algorithms
A poly-alphabetic substitution cipher used in WWII by the Germans used a machine named what?
Enigma
A mono-alphabetic substitution does what?
Rotates the letters of the alphabet X places
A mono-alphabetic substitution cipher is susceptible to what?
frequency analysis
The 4 fundamental goals of cryptography are:
Confidentiality
Integrity
Authentication
Non-repudiation
What type of cryptography is used to provide confidentiality?
A. symmetric
B. asymmetric
C. either/both
C. either/both
Cryptographic algorithms rely upon _____ (crypto-variables)
keys
In private key, participants use what?
A. unshared keys (all participants have their own)
B. shared keys (all participants share a key)
B. shared keys (all participants share a key)
In public key, participants use what?
A. unshared keys (all participants have their own)
B. shared keys (all participants share a key)
A. unshared keys (all participants have their own) (public/private keys)
The art and science of creating and implementing secret codes and ciphers
cryptography
The study of methods to defeat codes and ciphers
crypanalysis
What are true of Kerchoff’s principle? select all that apply
A. they should be known and public
B. they should be kept secret
C. keys should remain private
D. weaknesses are unknown
A. they should be known and public
C. keys should remain private
In the AND operations, 1 is returned when what?
When both X and Y are 1.
In the OR operations, 1 is returned when what?
When at least X or Y is 1.
In XOR operations, 1 is returned when what?
When only X or Y is 1, but not both.
The _______ function is the remainder of the division of one number by another.
EX: 10 Mod 3 is 1
A. Division
B. Multiplicity
C. Modular
D. Modulo
D. Modulo