Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Cryptography and Network Security
Quiz 3: Classical Encryption Techniques
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Short Answer
__________ encryption is a form of cryptosystem in which encryption and decryption are performed using the same key.
Question 22
Short Answer
An encryption scheme is said to be __________ if the cost of breaking the cipher exceeds the value of the encrypted information and the time required to break the cipher exceeds the useful lifetime of the information.
Question 23
Multiple Choice
the ___________ takes the ciphertext and the secret key and produces the original plaintext.It is essentially the encryption algorithm run in reverse.
Question 24
Short Answer
Cryptographic systems are characterized along three independent dimensions: the type of operations used for transforming plaintext to ciphertext; the way in which the plaintext is processed; and __________ .
Question 25
Short Answer
One of the simplest and best known polyalphabetic ciphers is _________ cipher.In this scheme, the set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers with shifts of 0 through 25.Each cipher is denoted by a key letter which is the ciphertext letter that substitutes for the plaintext letter A.
Question 26
Multiple Choice
If both sender and receiver use the same key, the system is referred to as:
Question 27
Multiple Choice
the __________ was used as the standard field system by the British Army in World War I and was used by the U.S.Army and other Allied forces during World War II.
Question 28
Multiple Choice
A way to improve on the simple monoalphabetic technique is to use different monoalphabetic substitutions as one proceeds through the plaintext Message.the general name for this approach is ___________ .
Question 29
Short Answer
A __________ cipher processes the input one block of elements at a time, producing an output block for each input block, whereas a stream cipher processes the input elements continuously, producing output one element at a time.