Semester 2 Mock Flashcards

1
Q

Encode the following message using the Caesar Cipher: ENCRYPTION

A

HQFUBSWLRQ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the maximum number of unique keys available for use with AES?

A

???

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the block size associated with AES?

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many rounds does the AES encryption algorithm specify?

A

In AES the number of rounds is dependent on the key size, cycles of repetition are as follows:
● 10 cycles of repetition for 128-bit keys.
● 12 cycles of repetition for 192-bit keys.
● 14 cycles of repetition for 256-bit keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many sub-keys are generated when using AES?

A

???One for each round

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the purpose of the S-boxes in AES?

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Calculate Φ(n) where p = 17 and q = 5
Detail your calculations
(3marks)

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain how an electronic message can be made ‘non-refutable’.
(4 marks)

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Encode the word BUISNESS using a Playfair cipher with a keyword of WORKER. Provide a detailed explanation for each stage of the encryption.
(10 marks)

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain how secure a computationally secure cipher actually is.
(5 marks)

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Decode the following message that has been encoded using a Rail Fence Cipher:
JEOILCL0ASNSSAE0MBDAOLD7

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EXPLAIN HOW Message Authentication Codes (MACs) work, their usefulness, and the benefit of using HMACSs as an alternative.

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Briefly describe each of the requirements that a public key cryptosystems must fulfil in order to be considered a secure algorithm.

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Detail each of the major flaws in WEP’s encryption mechanism.

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Detail the security issues associated with moving confidential business data from a business’s own local network to the Cloud.

A

….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List the additional security issues when using mobile phones for confidential business computing,

A

17
Q

Compare and contrast the different types of firewall available outlining the strengths and weaknesses of each.

A

18
Q

Describe THREE examples of intrusion attack.

A

19
Q

Explain in detail how Pretty Good Privacy (PGP) can be used to ensure message authentication and non-repudiation but not confidentiality.
(10 marks)

A

20
Q

Detail the two most important protocols associated with SSL/TLS.
(10 marks)

A