Question

41. Which of the following cipher systems uses polyalphabetic substitution? A. Vigenère B. Substitution C. Transposition D. S
0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer 41 :- A (Vignere cypher)

Answer 42 :- C ( AES , 10 rounds for 128 bit keys, 12 rounds for 192 bit keys, 14 rounds for 256 bit keys)

Answer 43 :- A ( SHA, uses cryptographic Hash Function)  

Answer 44 :- B (Inegrity and non-repudiation)

Answer 45 :- A (CA's private key)

Add a comment
Know the answer?
Add Answer to:
41. Which of the following cipher systems uses polyalphabetic substitution? A. Vigenère B. Substitution C. Transposition...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1) to verify a digital CERTIFICATE, we need the ___ a) CA's private key b) CA's...

    1) to verify a digital CERTIFICATE, we need the ___ a) CA's private key b) CA's public key c) certificate owner's private key d) certificate owner's public key 2) If the sender encrypts the message with the receiver's public key, it achieves the purpose of ___ a) confidentiality b) authentication c) confidentiality but not authentication d) confidentiality and authentication

  • 1.Which of the following statements about asymmetric-key encryption is correct? a When using asym...

    1.Which of the following statements about asymmetric-key encryption is correct? a When using asymmetric-key encryption method, a total of two keys are necessary in electronic communication between two parties. b Employees in the same company share the same public key. c Most companies would like to manage the private keys for their employees. d Most companies would like to use a Certificate Authority to manage the public keys of their employees. e Two of the above are correct. 2 Which...

  • Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1...

    Information Security I got 8/10 so please figure out which 2 answer is wrong. Question 1 (1 point) Dropbox is a typical example of SaaS in cloud computing. Question 1 options: True False T Question 2 (1 point) SSL cannot be combined with VPN. Question 2 options: True False F Question 3 (1 point) A remote access server can provide authentication services. Question 3 options: True False T Question 4 (1 point) In general, private key encryption is safer than...

  • Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital...

    Chapter 06 Applied Cryptography 1. How is integrity provided? A. Using two-way hash functions and digital signatures B. Using one-way hash functions and digital signatures C. By applying a digital certificate D. By using asymmetric encryption 2. Which term refers to the matching of a user to an account through previously shared credentials? A. Nonrepudiation B. Digital signing C. Authentication D. Obfuscation 3. Which term refers to an arranged group of algorithms? A. Crypto modules B. Cryptographic service providers (CSPs)...

  • (7) (2 pts) The simplified version of the handshaking procedure between a client and a bank...

    (7) (2 pts) The simplified version of the handshaking procedure between a client and a bank server for establishing a secure connection is described below (just consider it identical to the SSL/TLS described in class): 1. A client connects to the TLS-enabled bank server requesting a secure connection, and presents a list of supported ciphers (RC4, DES, AES, etc) and hash functions (MD5, SHA-1, etc). 2. The server picks the strongest cipher and hash. It then server sends back its...

  • secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B:...

    secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B: Public key C: Private Key D: Your house key 2. Which of the following protocols uses encryption? A: FTP B: Telnet C: SSH D: SMTP 3. What happens when rm is used to delete a file? A: Creates a new hardlink to the file B: Only removes the file pointer C: Removes file pointer and only writes over data D: Removes file pointer and...

  • 3) Out of the following, name which kind of attack you carried out in part 1...

    3) Out of the following, name which kind of attack you carried out in part 1 and part2: a. ciphertext only, b. known plaintext, c. chosen plaintext, d. chosen ciphertext. Explain your answer Problem 3 10 points] A 4-bit long message was encrypted using one-time pad to yield a cipher-text “1010” Assuming the message space consists of all 4-bit long messages, what is the probability that the corresponding plaintext was “1001”? Explain your answer. Problem 4 Assume we perform a...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT