mid exam practice quiz

.docx

School

Arizona State University *

*We aren’t endorsed by this school

Course

21120

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

10

Uploaded by AgentCapybara6567

Report
1. Question 1 After applying an encryption algorithm to a message as input, what is the right term to refer to the output? 1 point Cleartext Encryption key Ciphertext Plaintext 2. Question 2 The analysis of cryptography algorithms is called cryptanalysis. What is a goal of cryptanalysis? 1 point To recover the plaintext of an encrypted message without having the key To generate random numbers To calculate the entropy of a message To determine the encoding of a message 3. Question 3 One-time pad (OTP) is perfectly secure only when secure keys are used. How can we generate secure keys for one-time pads? 1 point Generate random and long-enough keys that have never been used before. Generate keys that do not contain English letters. Since keys without English letters are scarce, these keys can be reused sometimes. However, the keys must be re-generated periodically. Generate complicated and long-enough keys. The keys must be re-generated periodically. Generate and reuse random and long-enough keys. 4. Question 4 What does it mean when a crypto algorithm is computationally secure? 1 point
Brute forcing the key will not work. The time required to break the cipher is over 25 years on a workstation. The crypto algorithm cannot be broken with current computer technology within a reasonable period of time. No one will be able to decrypt an encrypted message unless he or she is the legitimate owner of the message and has the key. 5. Question 5 A one-way hash function takes an input string and generates an output string. What do we know about the length of the output string? 1 point The length of some output strings might be 0. The output string is of a fixed length. The output string is randomly sized. The length of the output string is determined by the input string. 6. Question 6 Given an encryption algorithm over the integer domain enc(plain, key) = plain + key with key being 5, please encrypt integer 27. What is the encryption result? 1 point An integer, 44 An integer, 275 A string, "275" An integer, 32 7. Question 7 In secure asymmetric crypto systems (or public-key crypto systems) with a private key and a public key, how challenging it is to calculate one key from the other? 1 point It is extremely difficult to calculate one key from the other key. It is easy to calculate one key as long as the other key is known.
It is easy to calculate the public key from a private key, but difficult to calculate the private key from a public key. It is easy to calculate the private key from a public key, but difficult to calculate the public key from a private key. 8. Question 8 In secure asymmetric cryptosystems (or public-key crypto systems) with a private key and a public key, how is the encryption performed? 1 point The encryption is performed using two private keys but not the public key. The encryption is performed using a private key. The encryption is performed using both a private key and a public key. The encryption is performed using two public keys but not the private key. 9. Question 9 Which hashing algorithm is still considered secure? 1 point SHA256 MD5 MD4 SHA1 10. Question 10 The predictability of random number sequences generated by a pseudo random number generator (PRNG) is related to its seed. To prevent the random number sequence from being guessed or predicted, which seed is ideal? 1 point The current timestamp (in seconds) ASCII values of a constant string (e.g., 0x61616161, converted from string "aaaa") The output of a better random number generator (e.g., byte sequences from /dev/random on Linux, or CryptGenRandom() on Windows) A constant integer (e.g., 1337)
11. Question 11 RSA is a secure asymmetric cryptographic system. Against which attack is RSA secure ? 1 point Timing side-channel attacks Brute forcing the private key Power side-channel attacks Deriving the private key from a public key (e.g., factorizing N for RSA and recovering p and q ) 12. Question 12 Which action is GnuPG capable of doing? 1 point Scanning networks Performing encryption Sniffing network traffic Brute forcing passwords 13. Question 13 Address Resolution Protocol (ARP) is a protocol used on Local Area Networks (LAN). What does it do? 1 point ARP maps domain names to IP addresses. ARP maps services to ports. ARP maps IP addresses to MAC addresses. ARP maps machines to machines. 14. Question 14 Tcpdump is a tool for capturing traffic. Consider this command line: tcpdump -i any -w dump.pcap What do -i and -w mean in this command line? 1 point
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help