Genius

Data Encryption Standard

 Data Encryption Standard





1. Two parties, Party A and Party B, regularly exchange messages using
public key cryptography. One party, Party A, believes that its private
encryption key has been compromised. What action should Party B take?
a. Request a new public key from Party A.
b. Request a new private key from Party A.
c. Send a new public key to Party A.
d. Send a new private key to Party A.


2. The Advanced Encryption Standard is another name for which cipher:
a. Digital Encryption Algorithm (DEA)
b. 3DES
c. Rijndael
d. International Data Encryption Algorithm (IDEA)


3. The Data Encryption Standard:
a. Is used by Secure Sockets Layer (SSL) encryption
b. Has been replaced by the International Data Encryption Algorithm
(IDEA)
c. Uses a 64-bit encryption key
d. Uses a 56-bit encryption key


4. Two parties are exchanging messages using public key cryptography.
Which of the following statements describes the proper procedure for
transmitting an encrypted message?
a. The sender encrypts the message using the recipient- public key,
and the recipient decrypts the message using the recipient-
private key.
b. The sender encrypts the message using the sender- public key, and the
recipient decrypts the message using the recipient- public key.
c. The sender encrypts the message using the sender- private key, and
the recipient decrypts the message using the recipient- private key.
d. The sender encrypts the message using the sender- public key, and the
recipient decrypts the message using the sender- public key.


5. A stream cipher encrypts data by XORing plaintext with the encryption
key. How is the ciphertext converted back into plaintext?
a. XORing it with the encryption key
b. XORing it with the inverse of the encryption key
c. ANDing it with the encryption key
d. NANDing it with the encryption key





Computer Science Assignment Help, Computer Science Homework help, Computer Science Study Help, Computer Science Course Help
Answered
Other / Other
21 Mar 2016

Answers (1)

  1. Genius

    Data Encryption Standard

    Data Encryption Standard ****** ******
    To see full answer buy this answer.
    Answer Attachments

    1 attachments —

    • img
      24254366.docx

Report As Dispute

Share Your Feedback

Give Review : A+ A B C D F