Details of this Paper





Question;SHORT;ANSWER;1. __________ encryption is a;form of cryptosystem in which encryption and decryption are performed using the;same key.;2. A technique for;hiding a secret message within a larger document or picture in such a way that;others cannot discern the presence or contents of the hidden message is __________.;3. An encryption;scheme is said to be __________ if the cost of breaking the cipher exceeds the;value of the encrypted information and the time required to break the cipher;exceeds the useful lifetime of the information.;4. The two types of attack;on an encryption algorithm are cryptanalysis based on properties of the;encryption algorithm, and _________ which involves trying all possible keys.;5. Cryptographic;systems are characterized along three independent dimensions: The type of operations;used for transforming plaintext to ciphertext, The way in which the plaintext;is processed, and __________.;6. All encryption;algorithms are based on two general principles: substitution and;7. One of the simplest;and best known polyalphabetic ciphers is _________ cipher. In this scheme, the;set of related monoalphabetic substitution rules consists of the 26 Caesar ciphers;with shifts of 0 through 25. Each cipher is denoted by a key letter which is;the ciphertext letter that substitutes for the plaintext letter a.;8. A __________ cipher;processes the input one block of elements at a time producing an output block;for each input block whereas a __________ cipher processes the input;elements continuously producing output one element at a time.


Paper#55158 | Written in 18-Jul-2015

Price : $22