100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGU C839 Cryptography: Questions With A+ Solutions $10.99   Add to cart

Exam (elaborations)

WGU C839 Cryptography: Questions With A+ Solutions

 2 views  0 purchase
  • Course
  • WGU C839
  • Institution
  • WGU C839

WGU C839 Cryptography: Questions With A+ Solutions

Preview 2 out of 9  pages

  • November 15, 2024
  • 9
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • WGU C839
  • WGU C839
avatar-seller
Zendaya
WGU C839 Cryptography: Questions With A+ Solutions

Kerckhoff's Principle Right Ans - A cryptosystem should be secure even if
everything about the system, except the key, is public knowledge.

Opposite of *security by obscurity*

Modern Cryptographic Algorithm Types Right Ans - Asymmetric and
Symmetric;

Combine substitution and transposition

Symmetric Cryptography Right Ans - Encryption that uses a *single key* to
encrypt and decrypt a message

Major issue is key exchange

C=E(k,p)

P=D(k,c)

Cryptographic *Substitution* Right Ans - Changing some part of the
plaintect for a matching part of the ciphertext.

All historical examples of crytpographic algorithms algorithms fall into this
category.

Cryptographic *Transposition* Right Ans - The swapping of blocks of
ciphertext.

Binary *OR* Right Ans - Asks if there is a 1 in the first number of the
second number, or in both, and returns a 1 if *TRUE*

1101
0110

1111 (result of OR)

, Binary *AND* Right Ans - Asks if there is a 1 in both the numbers and
returns a 1 if *TRUE*

1101
0110
0100 (result of AND)

Binary *XOR* Right Ans - Asks if there is a 1 in first number or the second
number, *but NOT in both* and returns 1 if *TRUE*

1101
0110
0101 (result of XOR)

Is reversible

Extensively used in modern cyrptography

Types of Symmetric Algorithms Right Ans - Block Ciphers and Stream
Ciphers

Block Ciphers Right Ans - Encrypts a message one block at a time

Usually 64-bit blocks, but newer algorithms (AES) use 128-bit blocks

Stream Ciphers Right Ans - Encrypt the data as a stream, one bit at a time

sub-key for the round Right Ans -

round function Right Ans -

Decryption (Feistel Function) Right Ans - SAME encryption function, but
keys/sub-keys in descending order!

Feistel Function Right Ans - AKA Feistel Cipher or Feistel Network

Invented by Horst Fesitel while working for IBM

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Zendaya. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart