logo

Crowdly

Browser

Add to Chrome

25-26 IY2760/DC3760: Introduction to Information Security

Looking for 25-26 IY2760/DC3760: Introduction to Information Security test answers and solutions? Browse our comprehensive collection of verified answers for 25-26 IY2760/DC3760: Introduction to Information Security at moodle.royalholloway.ac.uk.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

This is a model of  stream cipher.  X is the input to a keystream generator, Y is the output.  Y and W are inputs to an XOR operator, and Z is the output.  What is X?  

This is a model of a stream cipher.

0%
0%
100%
0%
View this question

Consider the following cryptosystem:

Let the plaintext and ciphertext space be .  The secret key is , where each for .

To encrypt a string of plaintext symbols using key  , we perform the following operation to obtain ciphertext   :

, if ;

 if ;

 if .

In other words, we add (mod 5) to the first position of the plaintext, to the second position of the plaintext, to the third position of the plaintext, and continue with adding to the fourth position of the plaintext, to the fifth position of the plaintext and so forth.

Suppose you intercepted the ciphertext 0 1 4 4 0 0 3 2 1, and you know that the plaintext in positions 4, 8 and 9 are 3, 4, 4, that is, the plaintext is 3   , 4, 4, where indicates that these symbols are unknown.  

Determine the key.

View this question

The following substitution cipher is to be used to encrypt and decrypt some plaintext and ciphertext:

Plaintext ABCDEFGHIJKLMNOPQRSTUVWXYZ
Ciphertext  LYNBRGMTZSCOAWKFIXPVDQUHJE

Decrypt the ciphertext RLPJ. 

Enter your answer without spacing.

View this question

Match the types of attack to the amount of information the adversary Oscar has.

View this question

A block cipher uses binary plaintext blocks of length 64 and binary keys of length 128.  What is the size of the key space? (Marks may be deducted for a wrong choice.)

0%
0%
0%
100%
View this question

An encryption algorithm outputs a ciphertext.  What is/are the input(s)?  Pick all the correct answers.  (Marks may be deducted for wrong answers.)

0%
0%
0%
0%
0%
View this question

Pick all the descriptions of active attacks. (Marks may be deducted for wrong choices.)

0%
0%
0%
0%
View this question

Pick a security property that has been compromised in the following scenario.  (There may be more than one correct answer.  You only need to pick one.)

Alice found that she could not send messages in her instant messaging app.

100%
0%
0%
0%
View this question

Want instant access to all verified answers on moodle.royalholloway.ac.uk?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome