What is enigma encryption machine


Assignment

Part 1

1. Know the terminology flash cards.

2. Know the historical cryptographic systems.

3. Know the popular symmetric, asymmetric, and hashing algorithms.

4. What is the definition of Cryptography?

5. Who is known as the father of Western cryptography?

6. What makes up the CIA Triad?

7. How does the Caesar Cypher work?

8. What is the Scytale cipher?

9. What's the difference between asymmetric and symmetric algorithms?

10. What was the application of cryptography created by the Egyptians?

11. What is the Vigenere Cypher?

12. What is DES (Data Encryption Standard)?

13. What is the Rijndael Algorithm?

14. What is the relationship between AES an DES in the US?

15. What are Symmetric algorithms are typically known for their ability to maintain?

16. How many and what type of keys involved with Symmetric Algorithms?

17. What's the advantages of stream ciphers over block ciphers?

18. What ciphers typically use XOR operations?

19. What is an algorithm?

20. What is a certificate authority?

21. What is ciphertext?

22. What are collisions?

23. What is cryptanalysis?

24. What is meant by Decrypt?

25. What is a digital signature?

26. What is meant by Encrypt?

27. What is a Hash Function?

28. What is known as Key clustering?

29. What is a key space?

30. What is non-repudiation?

31. What is plaintext?

32. What is SSL/TLS?

33. What is the work factor?

34. What does the Kerckhoff Principle states?

35. Does it help to know the amount of data that you are encrypting ahead of time using block ciphers?

36. What are one-time pads?

37. What is digital watermarking?

38. What are transposition ciphers?

39. What are Vigenere Ciphers?

40. What is meant by codes?

41. What are polyalphabetic ciphers?

42. What is the process known as steganography?

43. What are running key ciphers?

44. Electronic Code Book works well with block cyphers.

45. Cipher Block Chaining is similar to Electronic Code Book but it uses an IV to add security.

46. Caesar cipher and Vigenere cipher are symmetric algorithms.

47. Block ciphers are not more closely emulate one-time pads.

48. Asymmetric algorithms are sometimes used for digital signature applications.

49. What is Enigma encryption machine?

50. A strength of symmetric algorithms is that they have multiple modes.

51. A strength of asymmetric algorithms when compared to symmetric algorithms is key management. (sharing keys with others while maintaining secrecy)

52. What are the weaknesses of symmetric algorithms?

Part 2

All the following statement about International Data Encryption Algorithm (IDEA) are True, except:

Question 1

Digital Certificates provide the following services, ??

Question 2

_______________ take whatever plaintext is put into them and break it into pieces calls block

Question 3

Triple DES (3DES) triple-encrypts each block with either two independent keys

Question 4

No matter where encryption is implemented, the process is

Question 5

PKI provides ___________________ over an insecure medium

Selected Answer: Penetration test and virus testing medium

Question 6

Data Encryption Standard (DES) is a 56-bit key algorithm, but the key is too short to be used today

Question 7

A trusted third-party is:

Selected Answer: Someone or a computer that you trust

Question 8

All the following statements are true, except:

Selected Answer: a.

Blowfish is an algorithm was not designed to be strong, fast, and simple

Question 9

The entity responsible for accepting information about a party wishing to obtain a certificate is

Question 10

Some different ways a block cipher can operate are all the following, except:

Question 1

For Certification Authority, which of the following is True?

Question 12

All encryption methods (other than hashing) convert plaintext to ciphertext and back via

Question 13

The following statement are true about Hashing, EXCEPT:

Selected Answer: None of the above is true, Hashing is not a part of the cryptosystem

Question 14

Asymmetric is also called.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Network Security: What is enigma encryption machine
Reference No:- TGS02966653

Now Priced at $50 (50% Discount)

Recommended (91%)

Rated (4.3/5)