1. Link encryption is a series of encryptions and decryptions between systems, where each system in a network decrypts the message sent to it, re-encrypts
1.
Link encryption is a series of encryptions and decryptions between systems, where each system in a network decrypts the message sent to it, re-encrypts it using different keys, then sends it to the next neighbor. This process continues until the message reaches the final destination.
a. True
b. False
2. To perform the Caesar cipher encryption operation, the pad values are added to numeric values that represent the plaintext that needs to be encrypted.
a. True
b. False
3.A brute force function is a mathematical algorithm that generates a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity.
a. True
b. False
4.Steganography is a data hiding method that involves embedding information within other files, such as digital pictures or other images.
a. True
b. False
5._____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
a. Decryption
b. Cryptology
c. Cryptography
d. Encryption
6._____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
a. Encryption
b. MAC
c. Hash
d. Key
7.The _____ algorithm, developed in 1977, was the first public-key encryption algorithm published for commercial use.
a. RSA
b. AES
c. MAC
d. DES
8._____ are encrypted message components that can be mathematically proven to be authentic.
a. Message certificates
b. MACs
c. Message digests
d. Digital signatures
9.Digital signatures should be created using processes and products that are based on the _____.
a. DSS
b. HTTPS
c. SSL
d. NIST
10. _____ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.
a. PGP
b. AH
c. DES
d. ESP
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance