Cryptography

Cryptography

University

80 Qs

quiz-placeholder

Similar activities

IAS 2 FINAL EXAMINATION

IAS 2 FINAL EXAMINATION

University

85 Qs

FINAL EXAM NETWORK FUNDAMENTALS OF NETWORK

FINAL EXAM NETWORK FUNDAMENTALS OF NETWORK

University

80 Qs

Cryptography

Cryptography

University

82 Qs

Active Directory Quiz

Active Directory Quiz

University

78 Qs

PYTHON CERT REVIEWER

PYTHON CERT REVIEWER

University

75 Qs

Database Concepts and SQL Quiz

Database Concepts and SQL Quiz

University

80 Qs

Database Management System Quiz

Database Management System Quiz

University

80 Qs

HTML Quizz-01

HTML Quizz-01

University

75 Qs

Cryptography

Cryptography

Assessment

Quiz

Computers

University

Medium

Created by

AIzhan Kakharman

Used 81+ times

FREE Resource

80 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Consider the Vigenere cipher over the lowercase English alphabet, where the key length can be anything from 8 to 12 characters. What is the size of the key space for this scheme?

4 * 26^12

26!

26^12

26^8 + 26^9 + 26^10 + 26^11 + 26^12

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Consider the Vigenere cipher over the lowercase English alphabet, where the key has length 8. For which of the following message spaces will this scheme be perfectly secret? (Check all that apply.)

The set of all 8-character strings of lowercase English letters.

The set of all 9-character strings of lowercase English letters.

The set of all strings of lowercase English letters containing at most 8 characters.

The set of all 7-character strings of lowercase English letters.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the result of encrypting the ASCII plaintext 'cool!' using the variant Vigenere cipher (where encryption is done using byte-wise XOR) and key 0x01 3F?

0x26 05 E6 35 02

0x63 6F 6F 6C 21

0x62 50 6F 6C 21

0x62 50 6E 53 20

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Say we have a scheme with a claimed proof of security with respect to some definition, based on some assumption. The scheme was successfully attacked when used in the real world. What are possible reasons for this? (Check all that apply.)

The proof might be incorrect.

The definition of security may not correctly capture the real-world threat model.

The assumption may be false.

The attacker did not read the proof of security.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the definition of perfect secrecy, what threat model is assumed?

The attacker can eavesdrop on a single ciphertext.

The attacker is able to interfere with the communication channel between the two honest parties.

The attacker can eavesdrop on as many ciphertexts as it likes.

The attacker can carry out a chosen-plaintext attack.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Consider the Vigenere cipher over the lowercase English alphabet, where the key can have length 1 or length 2, each with 50% probability. Say the distribution over plaintexts is Pr[M='aa'] = 0.4 and Pr[M='ab'] = 0.6. What is Pr[C='bb']? Express your answer to 4 decimal places with a leading 0, i.e., if your answer was 1/2 then you would enter 0.5000 (without a trailing period).

0.01

0.0001

0.0084

0.0072

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Consider the Vigenere cipher over the lowercase English alphabet, where the key can have length 1 or length 2, each with 50% probability. Say the distribution over plaintexts is Pr[M='aa'] = 0.4 and Pr[M='ab'] = 0.6. What is Pr[M='aa' | C='bb']? Express your answer to 4 decimal places with a leading 0, i.e., if your answer was 1/2 then you would enter 0.5000 (without a trailing period). Note: carry out the calculation exactly (i.e., do not use the truncated result that you entered as your answer in the previous question) before truncating your answer to 4 decimal places.

0.9473

0.1

0.0024

0.4839

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?