logo

Crowdly

Browser

Add to Chrome

CMP5385 Applied Cryptography A S1 2025/6

Looking for CMP5385 Applied Cryptography A S1 2025/6 test answers and solutions? Browse our comprehensive collection of verified answers for CMP5385 Applied Cryptography A S1 2025/6 at moodle.bcu.ac.uk.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Solve:

12 mod 5

View this question

Alice replaces each letter with the one three positions forward (A → D).

What cipher is being used?

0%
0%
0%
0%
View this question

During a secure transaction, an attacker captures encrypted data packets between a bank and a customer. Later, they resend these exact packets to the bank to trick it into processing a duplicate payment.

Which type of attack is this?

View this question

A user downloads a software update. The update is signed with the developer’s private key, and the user’s system verifies the signature using the developer’s public key. After installation, the software behaves as expected.

Which security goals are demonstrated?

0%
0%
0%
View this question

Solve:

17  mod 13

View this question

A user logs into their email using a password. The system stores passwords as plaintext. An attacker steals the database and reads all passwords.

Which security goal is missing?

View this question

PayPal sends digitally signed receipts to confirm transactions.

Which goal is ensured?

0%
0%
0%
View this question

Two-factor authentication for Microsoft accounts prevents unauthorised access.

Which goal does it reinforce?

0%
0%
0%
View this question

WhatsApp allows only sender and receiver to read messages.

Which type of attack does this prevent?

View this question

Solve:

42 mod 11

View this question

Want instant access to all verified answers on moodle.bcu.ac.uk?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome