This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Jean Maurice Rakotoarimanana Review Question ch-8 1-What are cryptography and cryptanalysis? Cryptography is the process of making and using codes to secure the transmission of information, and cryptanalysis is the process of obtaining the original message (called the plaintext) from an encrypted message (called the ciphertext) without knowing the algorithms and keys used to perform the encryption. 2-What were some of the fist uses of cryptography? Egyptian scribes used nonstandard hieroglyphs while inscribing clay tablets, this is the first documented use of written cryptography. 3-What is a key, and what is it used for? The information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext, the key can be a series of bits used by a computer program, or it can be a passphrase used by humans that is then converted into a series of bits used by a computer program. 4What are the three basic operations in cryptography? Algorithm, Code, and Decipher. 5-What is hash function, and what can it be used for? Are mathematical algorithms that generate a message summary or digest (sometimes called a fingerprint) to confirm the identity of a specific message and to confirm that there have not been...
View Full Document
This note was uploaded on 03/15/2012 for the course CIS CIS120 taught by Professor Zales during the Spring '12 term at Harrisburg Area Community College.
- Spring '12