With a rotation of 4, what does erwaiv decrypt to?
CEH Study Guide - 13 Cryptography

Quiz
•
Computers
•
Professional Development
•
Hard

Alejandro Hidalgo
Used 9+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
waive
wave
answer
decrypt
Answer explanation
This is a rotation cipher with a key of 4. When you rotate the alphabet by 4, you end up
with e = a, r = n, w = s, and so on. In addition to not being the right decryption, none of the
others have the correct number of letters. In a substitution cipher like a rotation cipher, you
will always have the same number of letters in the output as you do in the input
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do you call a message before it is encrypted?
Text
Plain text
Bare words
Bare text
Answer explanation
In cryptography, any data or message that is in an unencrypted state is called plaintext.
The output from a cryptographic process is ciphertext. While you may have text as input
to an encryption process, the word text would be ambiguous in this context. The other two
are unrelated to cryptography.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does PGP use to verify identity?
Central authority
Web of users
Web of trust
Central trust authority
Answer explanation
Where certificate authorities use a centralized mechanism for verification of users or
certificate subjects, PGP uses a decentralized model. PGP calls this a web of trust, where
individual users sign keys that belong to other people to validate that they are who they say
they are. All of the other answers are made-up terms.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What principle is used to demonstrate that a signed message came from the owner of the key that signed it?
Non-repudiation
Non-verifiability
Integrity
Authority
Answer explanation
Integrity is part of the CIA triad but isn’t the principle that ties a signed message back
to the subject of the signing certificate. Non-verifiability is nonsense, and authority isn’t
relevant here. Instead, non-repudiation means someone can’t say they didn’t send a message
if it was signed with their key. This assumes the key was in their possession and password
protected, meaning no one else could use it.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is Diffie-Hellman used for?
Key management
Key isolation
Key exchange
Key revocation
Answer explanation
Certificates can be revoked but that’s not what Diffie-Hellman is used for. Key
management is a much broader topic than key exchange, which is what Diffie-Hellman is
used for. It is a process that allows two parties to an encrypted conversation to mutually
derive the same key starting with the same base value.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did 3DES improve on DES?
Made the key longer
Used two keys
Changed algorithms
Used three keys
Answer explanation
3DES, or Triple DES, uses three keys. The first key is used to encrypt the plaintext. The
second key is used to decrypt the ciphertext resulting from the first round of encryption.
Finally, the third key is used to encrypt the ciphertext that resulted from the decryption
with the second key. The key wasn’t made longer because the 168 bits used in 3DES aren’t
used in a single key. The underlying DES algorithm is still used.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What improvement does elliptic curve cryptography make?
Smaller keys improve speed
Algorithm is more complex
Doesn't use factoring, which is better
Longer keys
Answer explanation
Algorithms used for elliptic curve cryptography are not more complex, necessarily.
While they don’t use factoring, that fact alone doesn’t necessarily make the algorithms
better. Instead, elliptic curve cryptography relies on the assumption that determining a
discrete logarithm of a point on an elliptic curve can’t be computed in a consistent way. The
keys that result from elliptic key cryptography are actually smaller than those that result
from factoring with large prime numbers
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Cryptography Chap-1

Quiz
•
9th Grade - Professio...
10 questions
Subscriber Internet Telepon

Quiz
•
Professional Development
15 questions
Encryption

Quiz
•
Professional Development
15 questions
SEC+ Ch.10 Review Test

Quiz
•
Professional Development
13 questions
Level 5 - Certificates & PKI Quiz

Quiz
•
Professional Development
11 questions
The keyboard and mouse

Quiz
•
4th Grade - Professio...
11 questions
Linux Essentials Quiz 2

Quiz
•
Professional Development
10 questions
Computer Security Quiz

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade