Cipher
Ciphertext
Decryption
Encryption
21
23
11
212
14G:c*%3wM*-l6g_Bnp?d86
ALm4tyc?TY
Nursultan1612
Option 4
Vigenerecipher
RC4
Caesarcipher
RSA
Digital signatures offer only integrity
With public key crypto, we don‟t need to established a shared key in advance
Digital signatures offer not only integrity but also non-repudiation
With public key crypto, we need to established a shared key in advance
Roundfunction
FeistelCipher
DES
MessageDigest
Theplaintext
Gibberish
Errormessage
Option 4
It is impossible to break an encryption without a key
It is possible to try all possible numbers systematically to break the encryption
Without a key, if hackers are able to obtain the encrypted file, it is possible that they can obtain the program that converts it back
Even though someone can use the same program used to encrypt the file, it can never re-creates the original file without the secret numb Even though someone can use the same program used to encrypt the file, it can never re-creates the original file without the secret numb
Noneofthestatements
Transposition
Rearranging
Substitution
Mandatoryaccesscontrol
Noneofthestatements
Intrusiondetectionsystem
Man-in-the-middleattack
Preventing or inhibiting the normal use or management of communications facilities
Altering some portion of a legitimate message, or that messages are delayed or reordered, to produce an unauthorized effect.
Restricting access to resources to privileged entities.
. One entity pretends to be a different entity
Corroborating the source of information; also known as data origin authentication.
Keeping information secret from all but those who are authorised to see it
Ensuring information has not been altered by unauthorised or unknown means
Binding information to an entity
Any existing passwords remain vulnerable
Resourceintensive
Many users will simply ignore the guidelines.
Users will not be able to remember them
Pbvwe
Option 2
Option 3
Option 4
One-wayfunction
RC4
DES
RSA
RSA encrypts at a speed on par with symmetric cryptosystems
. No efficient algorithm exists for solving the RSA ciphertext problem
. Some experts believe that RSA 1024-bit keys may become breakable in the near term
All of the listed answers are TRUE
Keeping information secret from all but those who are authorised to see it
Ensuring information has not been altered by unauthorised or unknown means
Corroborating the source of information; also known as data origin
Binding information to an entity
Trapdoor
LogicBombs
TrojanHorses
Rootkit
Keylogger
TrojanHorse
WORM
Zombie
A cryptographic key attack
A brute force attack
An all combinations attack
A random key attack
To counter security attacks, and they make use of one or more security mechanisms to provide the service
To alter system resources or affect their operation.
To bind information to an entity
Option 4
48-bit
256-bit
56-bit
64-bit
Recording the time of creation or existence of information
Conveyance, to another entity, of official sanction to do or be something
Endorsement of information by a trusted entity
Restricting access to resources to privileged entities
Public-key algorithms are susceptible to dictionary attack
The fastest technique to break public-key algorithms is brute force
No one has been able to develop a public-key algorithm that has no weaknesses
Public-key algorithms are suitable to encrypt large data
Providing timeliness of authorisation to use or manipulate information or resources
Restricting access to resources to privileged entities
Endorsement of information by a trusted entity
. conveyance, to another entity, of official sanction to do or be something