Question

Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma...

Question 11 (1 point)

Approximately how many different starting settings could be created from the Enigma machine's remarkably simple architecture.

Question 11 options:

160 X 10 ^9

160 X 10^36

160 X 10^72

160 X 10^18

Question 12 (1 point)

PGP uses a two-phase encryption approach to encrypt a message, and a second two-phase approach to decrypt a message. Alice wishes to send a message to Bob that will be confidential and also prove to Bob that Alice was the sender. Which of the following pairs of phases is the correct sequence of phases that will accomplish Alice's objectives.

Pair 1: To encrypt the message, Alice uses Alice's private key, then Bob's public key, and sends the message to Bob.

Pair 2: To encrypt the message, Alice uses Bob's public key, then Alice's private key, and sends the message to Bob.

Pair 3: To decrypt the message, Bob uses Bob's private key, then Alice's public key.

Pair 4: To decrypt the message, Bob uses Bob's public key, then Bob uses Alice's public key.

Question 12 options:

Pairs 1 and 4

None of the choices is correct

Pairs 1 and 3

Pairs 2 and 3

Pairs 2 and 4

Question 13 (1 point)

Alice sends Bob an encrypted message using the RSA encryption method.

The RSA encryption method is based on two functions.

Given P = plaintext, and C = ciphertext, the two functions are:

P = C ^ G (mod N)

C = P ^ H (mod N)

What is G?

Question 13 options:

Alice's public key

Alice's private key

Bob's private key

Bob's public key

Question 14 (1 point)

Alice sends Bob an encrypted message using the RSA encryption method.

The RSA encryption method is based on two functions.

Given P = plaintext, and C = ciphertext, the two functions are:

P = C ^ G (mod N)

C = P ^ H (mod N)

What is H?

Question 14 options:

Alice's public key

Bob's private key

Bob's public key

Alice's private key

Question 15 (1 point)

In the context of Information Assurance and Security, the HIPAA Security Rule requires that individually identifiable patient information must be protected.

Which of the following type(s) of safeguards are required by the HIPAA Security Rule.

Question 15 options:

Administrative and Technical safeguards

Administrative safeguards

Technical safeguards

Physical and Technical safeguards

Administrative, Physical, and Technical safeguards

0 0
Add a comment Improve this question Transcribed image text
Answer #1

11. 160 X 10^18 settings possible

12. Pairs 2 and 3 are correct

13. c) Bob's private key

14. Bob's public key

15. Administrative, Physical, and Technical safeguards

Add a comment
Know the answer?
Add Answer to:
Question 11 (1 point) Approximately how many different starting settings could be created from the Enigma...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings...

    Q3: Suppose Bob wants to send an encrypted message to Alice. Which one of the followings is correct? 1. Bob uses a shared secret key to encrypt the message. Alice uses Bob's public key to decrypt the encrypted message. 2. Bob uses Alice's private key to encrypt the message. Alice uses a shared secret key to decrypt the encrypted message. 3. Bob uses Alice's public key to encrypt the message digest. Alice uses Bob's public key to decrypt the encrypted...

  • O-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-...

    o-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-5x13-65 and e-5. I. Describe the key pair generation procedure for Bob to generate his private key kor- d. With the above given parameters, use EEA to calculate d 2. Describe RSA encryption procedure that Alice uses to encrypt her plaintext message x to its above given parameters, what will be y? ciphertext y before sending the message to Bob. Suppose Alice's message x-...

  • This question tests your knowledge of encryption and decryption using the RSA method. the numbers in...

    This question tests your knowledge of encryption and decryption using the RSA method. the numbers in soled are deliberately chosen to be mall enough to focus on gown understanding without excessive calculations. Alice and Bob decide to use an RSA cryptosystem with public key (77, 13) for communication. Alice wants to send Bob the message m = 22. Determine Alice's ciphertext c. Determine Bob's private boy Carry out Bob's decryption of Aloe's ciphertext c, and compare his result with Alice's...

  • 5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key...

    5. Alice wishes to send the message m4 to Bob using RSA encryption. She looks up Bob's public key and finds that it is (n-55. c= 3 (a) Specify exactly what information Alice sends to Bob (b) What is Bob's private key? Show how he would use it to recover Alice's message (c) Explain why Bob should never use this choice of public key in real life. 5. Alice wishes to send the message m4 to Bob using RSA encryption....

  • 5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice...

    5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice and Bob have p= 17,9 = 19. Alice has e=31 and Bob has e=29. a. What is the public key pair used in the transmission? 2 marks b. What is the secret key pair used in the transmission? 4 marks c. Encrypt the message m=111. 4 marks d. Decrypt the resulting ciphertext. 4 marks e. What's the security problem between Alice and Bob? How...

  • your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and...

    your answer. Refer to attack scenarios on mutual authentication protocols that were discussed during the Lecture-7 and Tutorial-7.] 5 Marks] Q5 (OpenSSL and IPFS) Assume that the School of Science of RMIT University is planning to use IPFS-based repository of sensitive files for sharing among staffs. An owner of a particular file, say Alice wants to share the file to her supervisor, say Bob. Therefore, Alice encrypts the file with Alice and Bob's shared AES secret key (KaB) using OpenSSL,...

  • Exercise 1 (2 pts). In an RSA cryptosystem, Bob's public key is (n = 253, e...

    Exercise 1 (2 pts). In an RSA cryptosystem, Bob's public key is (n = 253, e = 3), Alice uses this public key to encrypt a message M for Bob. The resulting ciphertext is 110. Recover the message M. (You can use online modular calculators available at the Web.)

  • The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols...

    The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...

  • 2. Alice is a student in CSE20. Having learned about the RSA cryptosystem in class, she...

    2. Alice is a student in CSE20. Having learned about the RSA cryptosystem in class, she decides to set-up her own public key as follows. She chooses the primes p=563 and q = 383, so that the modulus is N = 21 5629. She also chooses the encryption key e-49. She posts the num- bers N = 215629 and e-49 to her website. Bob, who is in love with Alice, desires to send her messages every hour. To do so,...

  • Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q =...

    Question1: Alice and Bob use the Diffie–Hellman key exchange technique with a common prime q = 1 5 7 and a primitive root a = 5. a. If Alice has a private key XA = 15, find her public key YA. b. If Bob has a private key XB = 27, find his public key YB. c. What is the shared secret key between Alice and Bob? Question2: Alice and Bob use the Diffie-Hellman key exchange technique with a common...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT