Kripto 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,714,021
| Attempts: 2,405 | Pitanja: 89
Please wait...

Question 1 / 89
0 %
0/100
Score 0/100
1. Operacija šifrovanja i dešifrovanja kod apsolutno tajnih šifarskih sistema je

Explanation

XOR (exclusive OR) is the correct answer for the question. XOR is a logical operation that returns true if the inputs are different and false if they are the same. In the context of encryption and decryption in absolutely secret cipher systems, XOR is commonly used as it provides a high level of security. XORing a message with a secret key produces the encrypted message, and XORing the encrypted message with the same key retrieves the original message. This operation is reversible and ensures that the encrypted message cannot be easily deciphered without the key.

Submit
Please wait...
About This Quiz
Kripto 1 - Quiz

2. Kod One-Time Pad C=1001, K=1111

Explanation

The given question provides the ciphertext (C) as 1001 and the key (K) as 1111. The plaintext (P) is given as four different possibilities: 0110, 1100, 1111, and 0010. To decrypt the ciphertext using a one-time pad, we perform an XOR operation between the ciphertext and the key. In this case, 1001 XOR 1111 results in 0110, which matches one of the given plaintext options. Therefore, the correct answer is P=0110.

Submit
3. Integritet moze biti narusen u slucaju npada:

Explanation

Integrity can be compromised by unauthorized users and authorized users who misuse their privileges. Unauthorized users may gain access to sensitive information or systems, leading to potential data breaches or unauthorized modifications. On the other hand, authorized users who abuse their privileges can intentionally or unintentionally alter or delete data, jeopardizing the integrity of the system. Both scenarios pose a risk to the integrity of the system and can result in data corruption or loss.

Submit
4. U oblasti zastite informacija CIA oznacava:

Explanation

The correct answer is "Confidentiality, Integrity and Availability." In the field of information security, CIA stands for these three fundamental principles. Confidentiality ensures that information is only accessible to authorized individuals, integrity ensures that information is accurate and unaltered, and availability ensures that information is accessible and usable when needed. These principles help protect sensitive information and ensure its reliability and accessibility.

Submit
5. Ako se kod One-time pad sifre isti tajni radni kljuc upotrebi za dve razlicite poruke nastaje:

Explanation

If two ciphertexts obtained from the One-time pad cipher are XORed, the result will not reveal the secret key.

Submit
6. Autentifikacija obezbeđuje

Explanation

Autentifikacija obezbeđuje proveru identiteta. This means that authentication ensures that the identity of the user or entity trying to access a system or resource is verified. It helps in confirming that the user is who they claim to be, preventing unauthorized access and protecting against identity theft or impersonation.

Submit
7. Integritet moze biti narusen u slucaju napada:

Explanation

The correct answer is "Ovlascenih korisnika koji zloupotrebljavaju svoja prava, Neovlascenih korisnika" which translates to "Authorized users who abuse their privileges, Unauthorized users" in English. This answer suggests that integrity can be compromised when authorized users misuse their rights and when unauthorized users gain access to the system. Both scenarios can lead to unauthorized modifications, deletions, or alterations of data, thus compromising its integrity.

Submit
8. Blokovske sifre su zasnovane na konceptu kodnih knjiga gde:

Explanation

In block ciphers, each key determines a new codebook. This means that for each different key used, a different codebook is generated, which is used for encryption and decryption. The codebook creates uncertainty in the cipher, making it difficult for an attacker to decipher the encrypted message without knowing the key. Therefore, the statement "Svaki kljuc odredjuje novu kodnu knjigu" (Each key determines a new codebook) is a correct explanation of how block ciphers work.

Submit
9. Karakteristika "tajnih algoritama":

Explanation

The characteristics of "secret algorithms" are that they are difficult to remain secret for a long period of time and when they are made public, they often have weaknesses.

Submit
10. Blokovske sifre su zasnovane na konceptu kodnih knjiga gde:

Explanation

In block ciphers, a key determines a specific codebook or code table that is used for encryption and decryption. Each key corresponds to a unique codebook, which is a collection of mappings between plaintext and ciphertext. By using different keys, different codebooks are generated, introducing uncertainty and making it difficult for an attacker to decipher the encrypted message without the correct key. Therefore, the statement "Svaki kljuc odredjuje novu kodnu knjigu" (Each key determines a new codebook) is a correct explanation of the concept of block ciphers.

Submit
11. Za apsolutno tajni sifarski sistem karakteristika kljuca je:

Explanation

The correct answer is "Slucajni niz" which translates to "Random sequence" in English. This means that the key characteristics of an absolutely secret cryptographic system are based on a random sequence. Randomness is crucial in cryptography as it adds unpredictability and makes it difficult for attackers to decipher the encrypted information. Therefore, using a random sequence as a key helps to enhance the security and confidentiality of the system.

Submit
12. Sifarski sistem je bezbedan:

Explanation

The given correct answer states that the sifarski sistem is secure if the best possible attack is a complete search of the keys. This implies that if the system is designed in such a way that it is not vulnerable to other types of attacks, such as brute force or cryptographic attacks, and the only feasible way to compromise the system is through a complete search of all possible keys, then it can be considered secure.

Submit
13. Rec "bit" moze da se skrembluje na:

Explanation

The word "bit" can be scrambled in 6 different ways.

Submit
14. Ključ za klasične šifre tipa TRANSPOZICIJE KOLONA je

Explanation

The correct answer is "Broj kolona." In classical column transposition ciphers, the key is determined by the number of columns used to rearrange the letters of the message. The number of columns determines the order in which the letters are written out to form the ciphertext. Therefore, the number of columns is an essential element in decrypting the message correctly.

Submit
15. Sakrivanje informacija ili:

Explanation

Steganografija je proces skrivanja informacija unutar drugih oblika medija, kao što su slike, zvukovi ili tekstovi, na način da se promene ili sakriju tako da ne budu primetne. Ova tehnika se koristi kako bi se poruke ili podaci tajno preneli, a da ne izazovu sumnju ili privuku pažnju. Steganografija se razlikuje od kriptografije jer se ne bavi šifrovanjem samih podataka, već njihovim skrivanjem unutar drugih medija.

Submit
16. One-time pad sifra:

Explanation

The given correct answer states that the one-time pad cipher is used in places where the highest level of secrecy is required and it is highly impractical for use in computer networks. This implies that the one-time pad cipher provides a high level of security and confidentiality, making it suitable for sensitive information. However, it is not practical for use in computer networks due to its limitations, such as the need for a pre-shared key of the same length as the message and the challenge of securely distributing and managing the keys.

Submit
17. Sifra je ekonomicna ako je E=N(ST)/N(OT):

Explanation

The correct answer is "E priblizno jedanko 1." This is because the equation states that E is economical if it is approximately equal to 1.

Submit
18. Kod sifre transpozicije:

Explanation

The correct answer is "Slova se premestaju" because the given information suggests that the code is using a transposition cipher, which involves rearranging the letters of the message. The other options mentioned, such as changing letters to other letters or using a keyword, are not directly related to transposition ciphers.

Submit
19. Kod sifre transpozicije:

Explanation

The given answer "Slova se premestaju" is correct because the phrase "Kod sifre transpozicije" translates to "Transposition cipher" in English. In a transposition cipher, the letters of the plaintext are rearranged or shuffled to form the ciphertext. This means that the letters are indeed being moved or shifted, which aligns with the answer "Slova se premestaju."

Submit
20. Ulazni parametri u sifarski sistem su:

Explanation

The correct answer is "Otvoreni tekst, Kljuc za sifrovanje". This means that the input parameters in the cipher system are the plaintext and the encryption key. The plaintext refers to the original message that needs to be encrypted, while the encryption key is the secret information used to perform the encryption process. These two parameters are crucial in the cipher system as they determine the encryption and decryption process. The other mentioned parameters, such as the smart card, linear shift registers, and agreed mode of secret writing, may also be important components in the cipher system, but they are not specifically mentioned as input parameters in this question.

Submit
21. Supstitucija predstavlja:

Explanation

The correct answer is "Sifre zamene" which translates to "Substitution ciphers" in English. Substitution ciphers are a type of encryption technique where each letter in the plaintext is replaced with another letter or symbol. This method of encryption involves replacing the original letters with different letters or symbols according to a predetermined substitution key. Substitution ciphers are commonly used in cryptography to protect sensitive information and ensure data security.

Submit
22. One-time pad sifra:

Explanation

The correct answer states that the one-time pad cipher is used in places where the highest level of secrecy is required and that it is very impractical for use in computer networks. This means that the one-time pad cipher is highly secure and effective for protecting sensitive information in certain contexts. However, it is not suitable for use in computer networks due to its impracticality, possibly because it requires a large amount of resources and is difficult to implement and manage in such systems.

Submit
23. Supstitucije predstavljaju:

Explanation

The correct answer is "Sifre zamene" which translates to "Substitution ciphers" in English. Substitution ciphers are a type of encryption method where each letter in the plaintext is replaced by a different letter or symbol in the ciphertext. This method is commonly used in cryptography to protect sensitive information.

Submit
24. Nevidljivi vid tajnog pisanja odnosi se na:

Explanation

The correct answer is "Korišćenje tajnih mastila". This refers to the use of invisible ink, which is a type of secret writing technique. Invisible ink is a substance that is not visible to the naked eye, but can be revealed by applying heat, chemicals, or special light. It was historically used for covert communication or to hide sensitive information. By using invisible ink, messages can be written in plain sight without anyone knowing the true content unless they possess the means to reveal it.

Submit
25. Obeleziti sta cini dvostruku transpoziciju:

Explanation

The correct answer is "Transpozicija redova, Transpozicija kolona". This is because the given options are related to different types of transposition. "Transpozicija redova" refers to the transposition of rows, while "Transpozicija kolona" refers to the transposition of columns. These two operations are commonly used in cryptography and data manipulation to rearrange the order of rows and columns in a matrix or table.

Submit
26. Obeleziti tipican primer napada na servis "raspolozivost":

Explanation

Denial of Service (DoS) attack is a typical example of an attack on the "availability" of a service. In a DoS attack, the attacker overwhelms a system or network with an excessive amount of traffic or requests, causing it to become unavailable to legitimate users. This type of attack aims to disrupt the normal functioning of a service by exhausting its resources, such as bandwidth, processing power, or memory. By targeting the availability of a service, the attacker aims to prevent users from accessing or using the service effectively.

Submit
27. "Otvoren tekst" u kriptologiji moze da bude:

Explanation

In the field of cryptology, "otvoren tekst" refers to plaintext or unencrypted text. The given answer options - Slika (image), Video signal, Govorni signal (audio signal), and Tekst (text) - all represent different forms of data that can be considered as plaintext or unencrypted text. Therefore, all of these options can be classified as "otvoren tekst" in cryptology.

Submit
28. Sekvencijalne sifre predstavljaju:

Explanation

Sequential ciphers are pseudo generators whose output key is approximately random, similar to the one-time pad. These ciphers, such as DES, JDES, and AES, generate a sequence of blocks that are used to encrypt and decrypt data. The output key is not truly random like the one-time pad, but it is designed to be unpredictable and provide a high level of security.

Submit
29. Neporecivost je servis koji oznacava:

Explanation

The correct answer states that "Strana koja je poslala poruku ne moze da porekne da je to uradila" which translates to "The party that sent the message cannot deny having done so." This means that once a message has been sent, the sender cannot claim that they did not send it. This concept is known as non-repudiation, which ensures that the sender of a message cannot later deny their involvement or responsibility for the message.

Submit
30. Sifra A5/1 je primer:

Explanation

The correct answer is "Sequential codes." Sequential codes are a type of encryption that generates a sequence of numbers or characters based on a predetermined algorithm. These codes are used in various applications, such as generating unique identification numbers or in cryptographic systems. They are called "sequential" because the next code in the sequence can be easily determined from the previous one. This makes them less secure compared to other encryption methods, such as block ciphers or public-key cryptography.

Submit
31. Sifarski sistem sa javnim kljucem koristi:

Explanation

The correct answer is "Javni za sifrovanje, a privatni za desiforvanje" which means that a public key is used for encryption and a private key is used for decryption. In a public key encryption system, anyone can use the public key to encrypt a message, but only the intended recipient with the corresponding private key can decrypt and read the message. This ensures that the message remains secure and only accessible to the intended recipient.

Submit
32. Osnovne pretpostavke simetricnog sifarskog sistema su:

Explanation

The basic assumptions of a symmetric cipher system are that the key is kept secret and the algorithm is publicly known. This means that the key used for encryption and decryption is only known to the authorized parties, while the algorithm used for encryption and decryption is openly available to everyone. This allows for secure communication between parties, as the secrecy of the key ensures that only authorized individuals can decrypt the encrypted messages, while the public knowledge of the algorithm allows for transparency and verification of the encryption process.

Submit
33. Kod sifarskih sistema sa generatorima pseudoslucajnog niza, pored tajnog kljuca, koristi se obavezno:

Explanation

In cryptographic systems with pseudorandom number generators, in addition to the secret key, a session key is used. The session key is a temporary key that is generated for a specific session or communication session between two parties. It is used to encrypt and decrypt the data exchanged during that session, providing security and confidentiality. The session key is different for each session, making it more secure than using a single key for all communications.

Submit
34. Procedura C = E(P, K):

Explanation

The correct answer is "Predstavlja proces sifrovanja." The given text mentions "Procedura C = E(P, K)" which indicates a process of encryption (sifrovanja). Therefore, the correct answer is that it represents the process of encryption.

Submit
35. Kod blokovskih algoritama:

Explanation

The correct answer suggests that the message is divided into blocks of fixed length. This means that the message is broken down into equal-sized chunks, each containing a specific number of characters or bits. This approach allows for easier processing and manipulation of the message data.

Submit
36. Sekvencijalne šifre su nalik

Explanation

The correct answer is One-Time Pad. The One-Time Pad is a type of encryption where a random key is used only once to encrypt a message. It is considered to be one of the most secure encryption methods because it provides perfect secrecy if used correctly. The other options mentioned, such as substitution ciphers, Vigenere cipher, and Caesar cipher, are all different types of encryption methods but do not provide the same level of security as the One-Time Pad. Transposition ciphers involve rearranging the letters of a message, but they also do not provide the same level of security as the One-Time Pad.

Submit
37. Obeleziti bezbednosne racunarske protokole:

Explanation

The correct answer includes the protocols IpSec, SSL, and Kerberos. These protocols are all related to computer security. IpSec is a protocol used for securing internet communications by encrypting and authenticating IP packets. SSL (Secure Sockets Layer) is a protocol that provides secure communication over the internet, commonly used for websites that require sensitive information. Kerberos is a network authentication protocol that provides secure authentication for client/server applications. Therefore, these protocols are all examples of security protocols used to protect computer systems and data.

Submit
38. Cilj servisa raspolozivosti je:

Explanation

The purpose of the availability service is to ensure uninterrupted service to authorized users.

Submit
39. Izlaz iz linearnog pomerackog registra (LPR) ima sledece karakteristike:

Explanation

The correct answer is "Dobijeni niz je pseudoslucajan" which means "The resulting sequence is pseudorandom". This means that the output sequence appears to be random, but it is actually generated by an algorithm that follows a specific pattern or formula. Pseudorandom sequences are often used in simulations, cryptography, and other applications where true randomness is not necessary but a high level of unpredictability is desired.

Submit
40. Sifre zamene dele se na:

Explanation

The given answer suggests that the substitution cipher can be classified as both polialphabetic and monoalphabetic. A polialphabetic cipher is a cipher that uses multiple cipher alphabets, while a monoalphabetic cipher uses only one cipher alphabet. Therefore, the cipher in question involves the use of multiple cipher alphabets (polialphabetic) as well as the use of a single cipher alphabet (monoalphabetic).

Submit
41. Sifra A5/1 zasniva se na:

Explanation

Sifra A5/1 se zasniva na linearnim pomerackim registrima. To znači da se koriste registri za pomeranje bitova kako bi se generisao ključ za šifrovanje. Ovi registri pomeraju bitove u određenom obrascu koji se koristi za kombinovanje sa podacima i stvaranje šifrovane poruke. Linearni pomeracki registri su ključni element u algoritmu A5/1 i omogućavaju generisanje sigurnih šifrovanih poruka.

Submit
42. Ukoliko napadac poznaje jedan od kljuceva sifarskog sistema sa javnim kljucevima:

Explanation

If an attacker knows one of the keys of a public key encryption system, they cannot calculate the other key. This is because public key encryption relies on the use of a pair of keys - a public key for encryption and a private key for decryption. The keys are mathematically related, but it is computationally infeasible to calculate one key based on the knowledge of the other key. Therefore, the attacker cannot calculate the second key if they only know one of the keys.

Submit
43. Upotrebom testa frekvencija, vrlo lako razbijamo:

Explanation

By using a frequency test, it is easy to break the Caesar cipher. The Caesar cipher is a simple substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet. Since the frequency of letters in any given language is not evenly distributed, a frequency analysis can be used to determine the shift used in the Caesar cipher. This makes it vulnerable to decryption.

Submit
44. Kod sekvencijalnih sifara:

Explanation

In sequential ciphers, the inner key is used to generate the working key. This means that the inner key is responsible for generating the key that will be used in the encryption or decryption process. The working key is derived from the inner key and is used to initialize the algorithm's initial state. Therefore, the inner key plays a crucial role in generating the working key, which is essential for the functioning of sequential ciphers.

Submit
45. Racunarski bezbedan sifarski sistem ili:

Explanation

The correct answer is "Prakticno tajan sistem." This means "Practically secret system" in English. This term refers to a computer security system that is designed to be as secret as possible, but not necessarily completely secret. It implies that while the system may have measures in place to protect sensitive information, it acknowledges that achieving absolute secrecy is difficult or impractical.

Submit
46. Autentifikacija može da se zasniva na

Explanation

The correct answer includes three options: "Onom što jesmo" (based on who we are), "Onom što se poseduje" (based on what we possess), and "Onom što znamo" (based on what we know). These options suggest different ways in which authentication can be established. "Onom što jesmo" refers to biometric authentication, where individuals are authenticated based on unique physical or behavioral characteristics. "Onom što se poseduje" refers to possession-based authentication, where individuals are authenticated based on something they possess, such as a token or a smart card. "Onom što znamo" refers to knowledge-based authentication, where individuals are authenticated based on something they know, such as a password or a PIN.

Submit
47. Poznati kriptoanalitički metodi za VIžnerovu šifru su

Explanation

The given answer states that the well-known cryptographic methods for the Vigenère cipher are the Kasiski test and the Friedman test. The Kasiski test is used to find the length of the keyword used in the Vigenère cipher by analyzing the repeated patterns in the ciphertext. The Friedman test is used to determine the length of the keyword by analyzing the index of coincidence in the ciphertext. Both of these tests are commonly used in cryptanalysis to break the Vigenère cipher.

Submit
48. Obeleziti sta je tacno za softver zatvorenog koda:

Explanation

The correct answer states that closed-source software may contain "backdoors" and that one should not trust closed-source software. This means that closed-source software has the potential to have hidden vulnerabilities or malicious code that can be exploited by unauthorized individuals. Therefore, it is important to be cautious and skeptical when using closed-source software, as its security cannot be guaranteed.

Submit
49. Kod sekvencijalnih sifara koristimo:

Explanation

In sequential ciphers, we use an internal key to generate a working key. This internal key is used to determine the initial state of the algorithm and is essential for generating the working key. The working key is then used in the encryption or decryption process.

Submit
50. Algoritmi koji vrse transformaciju nad jednim bitom ili bajtom nazivaju se:

Explanation

The correct answer is "Sekvencijalni algoritmi". This is because the question is asking for the name of algorithms that perform transformations on one bit or byte. "Sekvencijalni algoritmi" refers to sequential algorithms, which means that they process data one step at a time in a specific sequence. Therefore, it is the most appropriate answer in the context of the question.

Submit
51. Primena klasicne sifre tipa TRANSPOZICIJE odgovara:

Explanation

The correct answer is "Shanon-ovom principu DIFUZIJE" because the application of classical transposition cipher aligns with Shannon's principle of diffusion. Diffusion refers to the spreading of the influence of each plaintext symbol throughout the ciphertext in a way that the relationship between the two is obscured. In a transposition cipher, the letters of the plaintext are rearranged, which helps in achieving diffusion by breaking the original order and making it harder to discern the original message.

Submit
52. Primena klasicne sifre tipa SUPSTITUCIJE odgovara:

Explanation

The correct answer is "Shanon-ovom principu KONFUZIJE." This is because the principle of confusion in Shannon's theory of cryptography refers to the idea of making the relationship between the plaintext and the ciphertext as complex and random as possible. Substitution ciphers, such as the classical substitution cipher mentioned in the question, aim to achieve this confusion by replacing each letter in the plaintext with a different letter in the ciphertext.

Submit
53. Kod transpozicije kolona pomoću ključne reči, ključ je

Explanation

The correct answer is "Broj kolona" because the question is asking about the key for column transposition. In column transposition, the key determines the number of columns in which the plaintext is arranged before encryption. The key is crucial in determining the arrangement of the plaintext and the order in which the columns are read during decryption. The keyword is used to determine the number of columns and their arrangement, making it the correct answer.

Submit
54. Obeleziti kriticne propuste(slabe tacke) veb aplikacija:

Explanation

The correct answer includes SQL injection, social engineering, and buffer overflow. These are critical vulnerabilities in web applications that can be exploited by attackers. SQL injection involves inserting malicious SQL code into input fields to manipulate the database. Social engineering is a technique used to manipulate people into revealing sensitive information. Buffer overflow occurs when a program tries to store more data in a buffer than it can handle, leading to potential security breaches. These vulnerabilities pose serious threats to the security and integrity of web applications.

Submit
55. Karakteristicna raspodela funkcije gustine verovatnoce za tajni simetricni kljuc je:

Explanation

The correct answer for the given question is "Uniformna raspodela" (Uniform distribution). This suggests that the probability density function for the secret symmetric key follows a uniform distribution, meaning that all possible values of the key have equal probability of being chosen. In other words, there is no preference or bias towards any particular value of the key, making it uniformly distributed.

Submit
56. Obeleziti karakteristike prakticno tajnog sifarskog sistema:

Explanation

The correct answer is that the cost of breaking the cipher exceeds the value of the open information, and the time it takes to break the cipher is longer than the time the information needs to remain secret. This means that the encryption system is practical because it provides a high level of security, as the cost and time required to break the cipher make it impractical for attackers to access the encrypted information. Additionally, the fact that the encryption is implemented through software adds to its practicality, as it allows for easy and efficient encryption and decryption processes.

Submit
57. Kod sekvencijalnih sifara softverska realizacija je:

Explanation

The correct answer is "Fleksibilnija od hardverske realizacije" which means "More flexible than hardware implementation". This means that a software implementation of sequential ciphers allows for more flexibility in terms of customization and modification compared to a hardware implementation. Additionally, the answer "Brza od hardverske realizacije" which means "Faster than hardware implementation" implies that a software implementation of sequential ciphers can be faster in terms of processing speed compared to a hardware implementation.

Submit
58. Procedura P = D(P, C):

Explanation

The given options describe different processes, such as digital signing, hashing, encryption, and decryption. However, the correct answer states that none of the options are applicable to the given procedure P = D(P, C). Therefore, the procedure does not correspond to any of the processes mentioned in the options.

Submit
59. Ciljevi kriptoanalize su

Explanation

The correct answer is "Ključ, Otvoreni tekst." In the field of cryptography, the main objectives of cryptanalysis are to determine the key used in encryption (Ključ) and to decipher the encrypted message (Otvoreni tekst). Cryptanalysis involves analyzing the algorithm used for encryption, but it is not one of the main objectives. Similarly, identifying the participants and analyzing the frequency of traffic may be relevant in certain contexts, but they are not the primary goals of cryptanalysis.

Submit
60. Cilj bezbednosnog servisa zastite "integritet" je:

Explanation

The goal of the security service "integrity" is to prevent unauthorized modification of the message content. This means that the service ensures that the message remains unchanged and has not been tampered with by unauthorized individuals.

Submit
61. Servis kontrole pristupa obuhvata:

Explanation

The correct answer includes two components: autorizacija (authorization) and autentifikacija (authentication). Authorization refers to the process of granting or denying access to resources based on the user's identity and privileges. Authentication, on the other hand, is the process of verifying the identity of a user or entity. Together, these two components ensure that only authorized and authenticated individuals or entities are granted access to the system or resources.

Submit
62. Sifarski sistem sa simetricnim kljucem koriste:

Explanation

The correct answer is "Jedan tajni kljuc" which translates to "One secret key" in English. In a symmetric key system, the same key is used for both encryption and decryption. This means that there is only one secret key that is known by both the sender and the receiver. This key is used to encrypt the data by the sender and decrypt it by the receiver, ensuring secure communication between them.

Submit
63. Cilj bezbednosnog servisa zastite "poverljivosti" je:

Explanation

The goal of the security service of "confidentiality" is to ensure the secrecy of transmitted data from eavesdropping. This means that the service aims to prevent unauthorized individuals from intercepting and accessing the information being transmitted. By providing confidentiality, the service ensures that only the intended recipients can access the data, protecting it from potential threats.

Submit
64. Kod bezuslovno bezbedne sifre:

Explanation

The correct answer is "Metodom pretrage svih kljuceva sve dobijene poruke su jednako verovatne." This means that by searching through all possible keys, all obtained messages are equally likely. This implies that there is no bias towards any specific message, and any message could potentially be the correct one.

Submit
65. Ako je poruka sifrovana apsolutno tajnim sifarskim sistemom

Explanation

The correct answer is "Kljuc je poznat samo posiljaocu i primaocu" which means "The key is known only to the sender and receiver". This statement suggests that the encryption system used is based on a secret key known only to the sender and receiver. This ensures the confidentiality of the message and prevents unauthorized access. The other options are not relevant to the given information or contradict the statement.

Submit
66. Nelinearnost kod sifre A5/1 se postize:

Explanation

The correct answer is "Neuniformnim taktovanjem LPR". This means that the nonlinearity of the A5/1 cipher is achieved through nonuniform clocking of the Linear Feedback Shift Register (LPR). This technique introduces randomness and complexity into the cipher, making it more resistant to cryptographic attacks.

Submit
67. Kod simetricnih sifarskih sistema:

Explanation

The correct answer states that the secret key should never be sent through the same communication channel as the encrypted message. This is because if the key is intercepted by an attacker, they can easily decrypt the message. Additionally, the answer also mentions that the secrecy of the system increases with the length of the secret symmetric key. This is because longer keys provide more possible combinations, making it harder for an attacker to guess or crack the key and decrypt the message.

Submit
68. Viznerova sifra se napada preko:

Explanation

The Viznerova cipher is attacked through the index of coincidence. The index of coincidence is a measure of how similar a given text is to a random distribution of letters. By analyzing the index of coincidence, one can determine the key length used in the Viznerova cipher and potentially decrypt the message.

Submit
69. Kod sifara zamene kljuc je:

Explanation

The correct answer is "Alfabetsko preslikavanje." This means that the key substitution code is based on mapping letters of the alphabet to different letters or characters. In this method, each letter in the plaintext is replaced by a corresponding letter or character in the ciphertext according to a predetermined mapping. This type of substitution cipher is commonly used in cryptography to encrypt messages.

Submit
70. U grupu klasicnih sifara spadaju:

Explanation

The correct answer includes "Kodne knjige" (codebooks), "Sifre transpozicije" (transposition ciphers), "Sifre zamene" (substitution ciphers), and "One-Time pad" (a type of encryption that uses a random key). These are all examples of classical ciphers, which are encryption techniques that have been used historically. Asymmetric ciphers, AES, DES, and hash functions are not considered classical ciphers as they are more modern encryption methods.

Submit
71. Napadi kod simetricnih sifara mogu biti realizovani na osnovu:

Explanation

The correct answer options all refer to methods that can be used to perform attacks on symmetric ciphers. "Poznatih parova: otvoreni tekst - sifrat" refers to known plaintext attacks, where the attacker has access to pairs of plaintext and corresponding ciphertext. "Poznatog otvorenog teksta" refers to known plaintext attacks where the attacker knows the plaintext but not the corresponding ciphertext. "Poznatog sifrata" refers to known ciphertext attacks, where the attacker knows the ciphertext but not the corresponding plaintext. These methods can be used to analyze the cipher and potentially break its encryption.

Submit
72. Karakteristicno za Homofone sifre je:

Explanation

Homofone sifre su karakteristične po tome što šifrat ima istu dužinu kao i otvoreni tekst, što znači da se svako slovo iz otvorenog teksta zamenjuje odgovarajućim šifrovanim slovom. Takođe, slova sa najvećom frekvencijom se šifruju na dva ili tri načina, što dodatno otežava dešifrovanje poruke.

Submit
73. Sifarski sistem je bezuslovno bezbedan ako:

Explanation

The correct answer is "Svi otvoreni tekstovi su jednako verovatni" (All plaintexts are equally probable) and "Ne moze da bude razbijen ni uz primenu neogranicenih racunarskih resursa" (It cannot be broken even with unlimited computing resources). These two conditions ensure the unconditional security of the cipher system. If all plaintexts are equally probable, it means that there is no pattern or information leakage in the ciphertext that can be exploited to decrypt the message. Additionally, if the cipher cannot be broken even with unlimited computing resources, it means that the algorithm used is strong and resistant to any computational attacks.

Submit
74. Karakteristicno za one-time pad je:

Explanation

The one-time pad encryption technique is characterized by the fact that the key can only be used once for encryption. This ensures a high level of security as it prevents any patterns or repetitions in the ciphertext that could be exploited by an attacker. Additionally, the length of the ciphertext is equal to the length of the plaintext, ensuring that no information is leaked through the length of the message. Lastly, the ciphertext produced by the one-time pad has the characteristics of a random sequence, making it difficult for an attacker to decipher any meaningful information from it.

Submit
75. Karakteristično za poligramske šifre je

Explanation

The characteristic of polygraphic ciphers is that the plaintext is divided into blocks, and these blocks are encrypted as a whole. This means that the plaintext is not encrypted character by character, but rather in blocks, which adds complexity and security to the encryption process. The blocks are combined in a nonlinear manner, further enhancing the security of the cipher.

Submit
76. Šifarski sistem sa simetričnim ključem

Explanation

The correct answer is "Tajnost im se zasniva na tajnosti ključa, Koristi isti ključ za šifrovanje i dešifrovanje". This answer correctly states that the secrecy of the symmetric key system relies on the secrecy of the key itself. In symmetric key cryptography, the same key is used for both encryption and decryption, ensuring that only those who possess the key can successfully decrypt the encrypted data. The secrecy of the key is crucial for maintaining the confidentiality and security of the encrypted information.

Submit
77. Obeležiti tačne odgovore za softverska rešenja za šifrovanje/dešifrovanje

Explanation

The given answer suggests that the software solutions mentioned are suitable for block ciphers and offer flexibility. It does not mention anything about the development time or suitability for sequential ciphers.

Submit
78. Obelezite sta je karakteristicno za Cezarovu sifru:

Explanation

The correct answer is "Monoalfabetska sifra, Sifra supstitucije, Sifra zamene". This means that the characteristic of Caesar cipher is that it is a monoalphabetic substitution cipher. In a monoalphabetic cipher, each letter in the plaintext is replaced by a corresponding letter in the ciphertext, using a fixed substitution method. In the case of Caesar cipher, this substitution is done by shifting the letters of the alphabet by a certain number of positions. Therefore, Caesar cipher is a type of substitution cipher where the substitution is done by replacing letters with other letters.

Submit
79. Cezarova sifra predstavlja:

Explanation

The correct answer is "Sifru zamene, Alfabetsko preslikavanje, Supstituciju". This is because the Cezarova sifra, also known as the Caesar cipher, is a substitution cipher where each letter in the plaintext is shifted a certain number of places down or up the alphabet. It involves replacing each letter with another letter in the alphabet, hence it is a form of substitution. This process can be seen as an alphabet mapping, where each letter is mapped to another letter in the alphabet. Therefore, the correct answer includes "Sifru zamene", "Alfabetsko preslikavanje", and "Supstituciju".

Submit
80. Sekvencijalne sifre za generisanje pseudo nizvoa koriste:

Explanation

Sekvencijalne sifre za generisanje pseudo nizova koriste pomeracke registre i promenljive tabele. Pomeracki registri su registri koji se koriste za pomeranje bitova u sekvenci, dok promenljive tabele sadrže vrednosti koje se koriste za transformaciju ili generisanje pseudo nizova. Ove komponente se koriste zajedno kako bi se generisao pseudo niz koji se može koristiti za razne svrhe, kao što su kodiranje, dekodiranje ili sigurnosne svrhe.

Submit
81. Osnovni uslovi kod One-time pad:

Explanation

The correct answer states that the key must not be repeated, it must be the same length as the message, and it must be a truly random sequence. This is because the one-time pad encryption method relies on each character of the message being combined with a unique character from the key, using a bitwise XOR operation. If the key is repeated, it introduces patterns that can be exploited by attackers. If the key is not the same length as the message, encryption and decryption become impossible. And if the key is not truly random, it can be predicted or guessed, compromising the security of the encryption.

Submit
82. Karakteristicno za sifre proste zamene duzine kljuca N, sa permutacijom kljuca:

Explanation

The correct answer is "Moguc je napad frekvencijskom analizom slova, Veliki prostor kljuceva(N!)". This is because the given statement implies that with a substitution cipher of key length N and key permutation, it is possible to perform a frequency analysis attack on the letters in the ciphertext. Additionally, the statement mentions that the key space is large, specifically N!, which means there are many possible keys to consider.

Submit
83. Osnovni bezbednosni koncepti su:

Explanation

The correct answer is Poverljivost, Integritet, Raspolozivost. These three concepts are fundamental to security. Poverljivost refers to the protection of information from unauthorized access or disclosure. Integritet ensures that data remains accurate and unaltered. Raspolozivost means that information and resources are accessible and available when needed. These concepts form the basis of a secure system, ensuring that data is protected, accurate, and available to authorized users.

Submit
84. Kod simetricnih sekvencijalnih sifarskih sistema:

Explanation

The correct answer is "Kljuc se ne sme dostavljati komunikacionim kanalom" which means "The key must not be delivered through the communication channel". This statement is true because in symmetric sequential cipher systems, the key should be kept secret and should not be transmitted through the same channel as the encrypted message. If the key is transmitted through the communication channel, it can be intercepted by unauthorized parties, compromising the security of the system. Additionally, the statement "Predajnik i prijemnik imaju isti kljuc" which means "The transmitter and receiver have the same key" is also true in symmetric sequential cipher systems, as both parties need to use the same key for encryption and decryption.

Submit
85. Upotreba linearnih pomeračkih registara kod sekvencijalnih šifarskih sistema obezbeđuje

Explanation

The use of linear shift registers in sequential cipher systems ensures a large period for the generated pseudorandom sequence.

Submit
86. Obeležiti karakteristike za generatore pseudoslučajnih nizova

Explanation

The statement "Na osnovu ključa kratke dužine dobija se pseudoslučajni niz velike dužine" suggests that by using a short key, a long pseudo-random sequence can be obtained. This implies that the generator of pseudo-random sequences is capable of producing a longer sequence based on a shorter input key. Additionally, the statement "Zahtevaju distribuciju ključa" indicates that the generator requires the distribution of the key, which further supports the idea that the generator relies on a key to produce the pseudo-random sequence.

Submit
87. Obeleziti tacne odgovore za hardverska resenja zastite:

Explanation

The correct answers for hardware solutions for protection are "Najbrze sifrovanje/desifrovanje" (Fastest encryption/decryption) and "Pogodno za sekvencijalne sifre" (Suitable for sequential ciphers). These solutions are efficient in terms of speed and can handle sequential ciphers effectively.

Submit
88. Sifarski sistem je bezbedan ako je:

Explanation

The correct answer is a combination of three conditions that ensure the security of the cipher system. Firstly, if the participants in the communication are confidential, it means that only authorized individuals have access to the system, reducing the risk of unauthorized access. Secondly, if the key space is large enough, it makes it difficult for attackers to guess or brute force the key, enhancing the security of the system. Lastly, if the only possible attack is through a complete search of the keys, it means that there are no known vulnerabilities or weaknesses in the system that can be exploited by attackers.

Submit
89. Karakteristike sesijskog kljuca kod sifarskih sistema sa GPSN:

Explanation

The correct answer is that the session key in cipher systems with GPSN should have good statistical characteristics, should be variable for each use, and does not need to be secret. This means that the session key should have a random and unpredictable distribution of values, it should be changed for every new session or use, and it does not necessarily need to be kept secret from attackers. These characteristics help to ensure the security and effectiveness of the cipher system.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 28, 2018
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (89)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Operacija šifrovanja i dešifrovanja kod apsolutno tajnih...
Kod One-Time Pad C=1001, K=1111
Integritet moze biti narusen u slucaju npada:
U oblasti zastite informacija CIA oznacava:
Ako se kod One-time pad sifre isti tajni radni kljuc upotrebi za dve...
Autentifikacija obezbeđuje
Integritet moze biti narusen u slucaju napada:
Blokovske sifre su zasnovane na konceptu kodnih knjiga gde:
Karakteristika "tajnih algoritama":
Blokovske sifre su zasnovane na konceptu kodnih knjiga gde:
Za apsolutno tajni sifarski sistem karakteristika kljuca je:
Sifarski sistem je bezbedan:
Rec "bit" moze da se skrembluje na:
Ključ za klasične šifre tipa TRANSPOZICIJE KOLONA je
Sakrivanje informacija ili:
One-time pad sifra:
Sifra je ekonomicna ako je E=N(ST)/N(OT):
Kod sifre transpozicije:
Kod sifre transpozicije:
Ulazni parametri u sifarski sistem su:
Supstitucija predstavlja:
One-time pad sifra:
Supstitucije predstavljaju:
Nevidljivi vid tajnog pisanja odnosi se na:
Obeleziti sta cini dvostruku transpoziciju:
Obeleziti tipican primer napada na servis "raspolozivost":
"Otvoren tekst" u kriptologiji moze da bude:
Sekvencijalne sifre predstavljaju:
Neporecivost je servis koji oznacava:
Sifra A5/1 je primer:
Sifarski sistem sa javnim kljucem koristi:
Osnovne pretpostavke simetricnog sifarskog sistema su:
Kod sifarskih sistema sa generatorima pseudoslucajnog niza, pored...
Procedura C = E(P, K):
Kod blokovskih algoritama:
Sekvencijalne šifre su nalik
Obeleziti bezbednosne racunarske protokole:
Cilj servisa raspolozivosti je:
Izlaz iz linearnog pomerackog registra (LPR) ima sledece...
Sifre zamene dele se na:
Sifra A5/1 zasniva se na:
Ukoliko napadac poznaje jedan od kljuceva sifarskog sistema sa javnim...
Upotrebom testa frekvencija, vrlo lako razbijamo:
Kod sekvencijalnih sifara:
Racunarski bezbedan sifarski sistem ili:
Autentifikacija može da se zasniva na
Poznati kriptoanalitički metodi za VIžnerovu šifru su
Obeleziti sta je tacno za softver zatvorenog koda:
Kod sekvencijalnih sifara koristimo:
Algoritmi koji vrse transformaciju nad jednim bitom ili bajtom...
Primena klasicne sifre tipa TRANSPOZICIJE odgovara:
Primena klasicne sifre tipa SUPSTITUCIJE odgovara:
Kod transpozicije kolona pomoću ključne reči, ključ je
Obeleziti kriticne propuste(slabe tacke) veb aplikacija:
Karakteristicna raspodela funkcije gustine verovatnoce za tajni...
Obeleziti karakteristike prakticno tajnog sifarskog sistema:
Kod sekvencijalnih sifara softverska realizacija je:
Procedura P = D(P, C):
Ciljevi kriptoanalize su
Cilj bezbednosnog servisa zastite "integritet" je:
Servis kontrole pristupa obuhvata:
Sifarski sistem sa simetricnim kljucem koriste:
Cilj bezbednosnog servisa zastite "poverljivosti" je:
Kod bezuslovno bezbedne sifre:
Ako je poruka sifrovana apsolutno tajnim sifarskim sistemom
Nelinearnost kod sifre A5/1 se postize:
Kod simetricnih sifarskih sistema:
Viznerova sifra se napada preko:
Kod sifara zamene kljuc je:
U grupu klasicnih sifara spadaju:
Napadi kod simetricnih sifara mogu biti realizovani na osnovu:
Karakteristicno za Homofone sifre je:
Sifarski sistem je bezuslovno bezbedan ako:
Karakteristicno za one-time pad je:
Karakteristično za poligramske šifre je
Šifarski sistem sa simetričnim ključem
Obeležiti tačne odgovore za softverska rešenja za...
Obelezite sta je karakteristicno za Cezarovu sifru:
Cezarova sifra predstavlja:
Sekvencijalne sifre za generisanje pseudo nizvoa koriste:
Osnovni uslovi kod One-time pad:
Karakteristicno za sifre proste zamene duzine kljuca N, sa...
Osnovni bezbednosni koncepti su:
Kod simetricnih sekvencijalnih sifarskih sistema:
Upotreba linearnih pomeračkih registara kod sekvencijalnih...
Obeležiti karakteristike za generatore pseudoslučajnih nizova
Obeleziti tacne odgovore za hardverska resenja zastite:
Sifarski sistem je bezbedan ako je:
Karakteristike sesijskog kljuca kod sifarskih sistema sa GPSN:
Alert!

Advertisement