CHAPTER 2: CLASSICAL ENCRYPTION TECHNIQUES

Question # 00040231 Posted By: solutionshere Updated on: 01/05/2015 05:24 AM Due on: 02/04/2015
Subject General Questions Topic General General Questions Tutorials:
Question
Dot Image

1. __________ techniques map plaintext elements (characters, bits) into ciphertext elements.

A) Transposition B) Substitution

C) Traditional D) Symmetric

2. Joseph Mauborgne proposed an improvement to the Vernam cipher that uses a random key that is as long as the message so that the key does not need to be repeated. The key is used to encrypt and decrypt a single message and then is discarded. Each new message requires a new key of the same

length as the new message. This scheme is known as a(n) __________ .

A) pascaline B) one-time pad

C) polycipher D) enigma

3. An original intelligible message fed into the algorithm as input is known as _________ , while the coded message produced as output is called the __________ .

A) decryption, encryption B) plaintext, ciphertext

C) deciphering, enciphering D) cipher, plaintext

4. Restoring the plaintext from the ciphertext is __________ .

A) deciphering B) transposition

C) steganography D) encryption

5. A __________ attack involves trying every possible key until an intelligible translation of the ciphertext is obtained.

A) brute-force B) Caesar attack

C) ciphertext only D) chosen plaintext

6. Techniques used for deciphering a message without any knowledge of the enciphering details is ___________ .

A) blind deciphering B) steganography

C) cryptanalysis D) transposition

7. The ___________ takes the ciphertext and the secret key and produces the original plaintext. It is essentially the encryption algorithm run in reverse.

A) Voronoi algorithm B) decryption algorithm

C) cryptanalysis D) diagram algorithm

8. If both sender and receiver use the same key, the system is referred to as:

A) public-key encryption B) two-key

C) asymmetric D) conventional encryption

Dot Image
Tutorials for this Question
  1. Tutorial # 00039377 Posted By: solutionshere Posted on: 01/05/2015 05:24 AM
    Puchased By: 3
    Tutorial Preview
    The solution of CHAPTER 2: CLASSICAL ENCRYPTION TECHNIQUES...
    Attachments
    Solution-00039377.zip (102 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    fa...unga Rating Expert tutors 01/05/2016

Great! We have found the solution of this question!

Whatsapp Lisa