100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cryptography (SEC-310-0) QUESTION AND ANSWERS 100% $7.49   Add to cart

Exam (elaborations)

Cryptography (SEC-310-0) QUESTION AND ANSWERS 100%

 0 view  0 purchase
  • Course
  • Institution

Selected Answer: Answers: Asymmetric encryption Symmetric encryption Data integrity algorithms Asymmetric encryption Authentication protocols Question 8 2 out of 2 points The essential elements of any pseudorandom number generator are a and a deterministic algorithm...

[Show more]

Preview 3 out of 19  pages

  • April 19, 2022
  • 19
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930
College of Technolo g
y




H

Review Test Submission: Week 4 Midterm Exam


User Ilhan Gocmez

Course Summer 2019 - Cryptography (SEC-310-0) Week
Test 4 Midterm Exam
Started 7/31/19 6:03 PM
Submitted 7/31/19 8:42 PM
Status Completed
Attempt 102 out of 100 points
Score
Time 2 hours, 39 minutes
Elapsed
Instructions Please complete the Midterm Exam. The midterm exam covers the content covered in Weeks 1-4. The Mid-term Exam is open book and consists of short answer and
multiple choice questions. Use the textbook and resources found on this Blackboard course.

ResultsAll Answers, Submitted Answers, Correct Answers Displayed



Question 1
2 out of 2 points

DES exhibits the classic block cipher structure, which consists of a number of identical rounds of processing.

Selected
Feiste
Answer:
l
Answers:
Feiste

l

SAC
Shanno
n
Rendell




Question 2
2 out of 2 points

The was used as the standard field system by the British Army in World War I and was used by the U.S. Army and other Allied forces
during World War II.

Selected
Playfair
Answer:
cipher Caesar
Answers:
cipher
Playfair cipher
Hill cipher
Rail Fence cipher




Question 3 2 out of 2 points

techniques map plaintext elements (characters, bits) into ciphertext elements

Selected
Substituti
Answer:
on
Answers:
Transposition
Traditional
Substituti

on Symmetric




Question 4
2 out of 2 points

https://wilmu.blackboard.com/webapps/assessment/review/review.jsp?
attempt_id=_14490244_1&course_id=_468552_1&content_id=_14043534_1&… 1/10

,8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930
The appeal of is that its designers have been able to prove an exact relationship between the strength of the embedded hash
function and the strength of this form of authentication.


Selected
HMAC
Answer:
MAC
Answers:
HMAC
GMAC
CMAC




https://wilmu.blackboard.com/webapps/assessment/review/review.jsp?
attempt_id=_14490244_1&course_id=_468552_1&content_id=_14043534_1&… 2/10

, 8/23/201 Review Test Submission: Week 4 Midterm Exam –
9 30169.201930


Question 5
2 out of 2 points

S/MIME provides authentication through the use of .

Selected
digital signatures
Answer:
asymmetric block
Answers:
encryption symmetric
block encryption radix-
64
digital signatures




Question 6
2 out of 2 points

Public-key algorithms are based on .


Selected
mathematical
Answer:
functions permutation
Answers:
mathematical functions

substituti
on
symmetry




Question 7
2 out of 2 points

is the most common method used to conceal small blocks of data, such as encryption keys and hash function values, which are used in digital signatures.


Selected
Asymmetric encryption

Answer:
Symmetric

Answers: encryption Data
integrity algorithms

Asymmetric

encryption

Authentication

protocols




Question 8
2 out of 2 points

The essential elements of any pseudorandom number generator are a and a deterministic algorithm for generating a stream of pseudorandom bits.

Selected
seed
Answer:
value secret
Answers:
key session
key
seed value

stream encryption function




Question 9 2 out of 2 points

The indicates that the subscriber identified in the certificate has sole control and access to the private key

Selected Answer: Answers:


https://wilmu.blackboard.com/webapps/assessment/review/review.jsp?
attempt_id=_14490244_1&course_id=_468552_1&content_id=_14043534_1&… 3/10

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller makish. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76710 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.49
  • (0)
  Add to cart