quiz6_sol - not the same and it is infeasible to compute it...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
CIS 4360 Introduction to Computer Security QUIZ 6, Fall 2011 (5 minutes only) — with answers This quiz concerns some of the basics of Cryptography. 1. Kerchofs assumption is that the adversary knows: (a) All the details oF the system including the secret key . . . NO . . . (b) All the details oF the system excluding the secret key . . . YES . . . (c) no details about the system . . . NO . . . (d) none oF these . . . NO . . . 2. With symmetric key encryption The encryption key is “essentially” the same as the decryption key . . . YES . . . . The encryption key is
Background image of page 1
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: not the same and it is infeasible to compute it From the the decryption key . . . NO . . . . 3. DES is an iterated cipher with • block length = 64 bits • key length = 56 bits 4. Triple DES is • as secure as single DES: . . . NO . . . . • more secure than DES: . . . YES . . . . 5. There are several major attacks on DES: • these are not a dramatic improvement on brute Force attacks: . . . YES . . . . • these are a dramatic improvement on brute Force attacks: . . . NO . . . . Mike Burmester...
View Full Document

{[ snackBarMessage ]}

Ask a homework question - tutors are online