Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Identify the choice that best completes the statement or answers the question. _

ID: 3547867 • Letter: I

Question

Identify the choice that best completes the statement or answers the question.

____ 1. One of the most famous ancient cryptographers was ____.

a. Albert Einstein c. Julius Caesar

b. Isaac Newton d. Caesar Augustus

____ 2. ____ is text that has no formatting (such as bolding or underlining) applied.

a. Plaintext c. Simpletext

b. Plain text d. Simple text

____ 3. ____ ensures that the information is correct and no unauthorized person or malicious software has altered that

data.

a. Confidentiality c. Encryption

b. Availability d. Integrity

____ 4. The most basic type of cryptographic algorithm is a ____ algorithm.

a. hash c. digest

b. key d. block

____ 5. ____ takes plaintext of any length and creates a hash 128 bits long.

a. RSA c. MD5

b. SHA1 d. MD2

____ 6. In MD5, the length of a message is padded to ____ bits.

a. 32 c. 128

b. 64 d. 512

____ 7. ____ is a relatively recent cryptographic hash function that has received international recognition and

adoption by standards organizations, including the International Organization for Standardization (ISO).

a. Twofish c. Whirlpool

b. Blowfish d. Rijndal

____ 8. Symmetric encryption is also called ____ cryptography.

a. private key c. symmetric key

b. public key d. shared key

____ 9. The simplest type of stream cipher is a ____ cipher.

a. shift c. lock

b. substitution d. loop

____ 10. A ____ cipher rearranges letters without changing them.

a. substitution c. loop

b. block d. transposition

____ 11. ____ is designed to replace DES.

a. AES c. 3DES

b. Twofish d. RSA

____ 12. The____ is a symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.

a. AES b. 3DES

d. Twofish   c. RSA


13. The algorithm ____ is a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448

bits.

a. RSA c. Blowfish

b. AES d. 3DES

____ 14. ____ encryption uses two keys instead of only one and these keys are mathematically related.

a. Symmetric c. Shared

b. Asymmetric d. Public key

____ 15. The basis for a digital signature rests on the ability of ____ keys to work in both directions.

a. symmetric c. unique

b. shared d. asymmetric

____ 16. The ____ algorithm is the most common asymmetric cryptography algorithm and is the basis for several

products.

a. AES c. Twofish

b. RSA d. Blowfish

____ 17. A ____ is a number divisible only by itself and 1.

a. prime number c. compound number

b. prime decimal d. neutral number

____ 18. ____ was first proposed in the mid-1980s and it uses sloping curves.

a. FCC c. ECC

b. RSA d. IKE


19. ____ attempts to use the unusual and unique behavior of microscopic objects to enable users to securely

develop and share keys as well as to detect eavesdropping.

a. Reactive cryptography c. Analog cryptography

b. Symmetric cryptography d. Quantum cryptography

____ 20. NTRUEncrypt uses ____ cryptography that relies on a set of points in space.

a. matrix-based c. linear

b. lattice-based d. quantum

____ 21. The ____ is essentially a chip on the motherboard of the computer that provides cryptographic services.

a. TPM c. reference monitor

b. SCM d. ODS

____ 22. ____ can be used to ensure the integrity of a file by guaranteeing that no one has tampered with it.

a. Blocking c. Encrypting

b. Hashing d. Cloning

____ 23. ____ can protect the confidentiality of an e-mail message by ensuring that no one has read it.

a. Public encryption c. Asymmetric encryption

b. Standard encryption d. Symmetric encryption

____ 24. ____ can verify the authenticity of the sender and enforce nonrepudiation to prove that the sender is who he

claims to be and cannot deny sending it.

a. Symmetric encryption c. Asymmetric encryption

b. Private encryption d. Elliptic encryption

Explanation / Answer

1.c. Julius Caesar

2.a. Plaintext

3. d. Integrity

4.a. hash

5. d. MD2

6.d. 512

7.a. Twofish

8.a. private key

9.b. substitution

10.d. transposition

11.d. RSA

12.a. AES

13.c. Blowfish

14.b. Asymmetric

15.d. asymmetric

16.a. AES

17.a. prime number

18.c. ECC

19.d. Quantum cryptography

20.b. lattice-based

21.a. TPM

22.b. Hashing

23.d. Symmetric encryption

24.c. Asymmetric encryption