Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Kerckhoffs\' Principle is: Question 2 options: Save Question 3 (5 points) A stre

ID: 3743320 • Letter: K

Question

Kerckhoffs' Principle is:

Question 2 options:

Save

Question 3 (5 points)

A stream cipher would be most appropriately used for:

Question 3 options:

Save

Question 4 (5 points)

Which encryption algorithm is most appropriate for checking whether a message has been altered?

Question 4 options:

Save

Question 5 (5 points)

Certificate pinning means

Question 5 options:

Save

Question 6 (5 points)

Use of encryption is most appropriate

Question 6 options:

Save

Question 7 (5 points)

The two critical properties of a cryptographic key are

Question 7 options:

Save

Question 8 (5 points)

One can break a Cæsar cipher with a key of one (one letter down in the alphabet) by inspection. What is the most appropriate approach for longer keys?

Question 8 options:

1) A cryptography algorithm must be assumed to be well-known. 2) The right-hand rule for electricity and magnetism. 3) It is crucial to keep the algorithm secret from adversaries. 4) Encrypting should not increase the size of the message.

Explanation / Answer

2. 1) A cryptography algorithm must be assumed to be well-known.

Explanation: According to Kerckhoff's principle, a cryptosystem should be secure even if everything about the system, except the key, is public knowledge.

3. 2) A telephone conversation.

Explanation: A stream cipher is an encryption algorithm that encrypts 1 bit or byte of plaintext at a time. It uses an infinite stream of pseudorandom bits as the key. In case of telephonic conversation, we can use stream cipher to encrypt each byte of data.

4. 1) public key cryptography.

Explanation: With public key cryptography, encrypting a message with one's private key is the same as signing the message! Anybody with access to the public key can decrypt the message but will know that the document could have been encrypted by the possessor of the private key. No third party is needed. We can generate a stand-alone fixed-length signature for a message by creating a hash of the document H(M) and then encrypting the hash with our private key. If a recipient wishes to verify the signature, it produces a hash of the document and decrypts the hash we sent by using our public key. If the hashes match, the document has not been altered.

5. 3) the user must enter a personal identifying number to allow a certificate to be accepted.

Explanation: Certificate pinning is the process of associating a host with its expected public key. Because you own both the server-side code and the client-side code, you can configure your client code to accept only a specific certificate for your domain name, instead of any certificate that corresponds to a trusted CA root certificate recognized by the operating system or browser.

6. 2) any time there is confidential data.

Explanation: Encryption is used to hide plain data from hackers. So we should use encryption to hide details like Credit card details, bank details, salary, etc from others except the authorized person.

7. 1) it should be long and repeating.

Explanation: A cryptographic key is just a random string consisting of hundreds or thousands of ones and zeroes (i.e. binary digits, or “bits”).

NOTE: As per Chegg policy, I can answer only 4 questions in a single post. I have gone ahead and answered 6 problems from 2 to 7. PLease post the remaining questions separately and I will try to answer them.