You are on page 1of 1

Symmetric Encryption Case Study

1. True/False Questions
i.True or False?
For most information technology occupations, knowledge of cryptography is a large
part of a broader skill set and is generally limited to relevant applications.
ii. True or False?
Cryptography is built on one overarching premise: the need for a cipher that can be
used reliably and portably to encrypt text so that through any means of cryptanalysis
(differential, deductive, algebraic, or the like) the ciphertext can be undone with any
available technology.
iii. True or False?
In effect, the Vernam stream cipher and “one-time pad” ciphers are different; in fact,
Vernam later coinvented it.
iv. True or False?
DES used a 64-bit block cipher combined with a mode of operation based on cipher-
block chaining (CBC) called the Feistel function.
v. True or False?
The cryptography selection process is documented in the system development life
cycle (SDLC) model.

2. Problema
How would an organization go about generating keys for symmetric key algorithms?
Give any ideas!

3. What is the meaning of symmetric authentication? Explain the detailed process!

Deadline: November 14 , 2022


th

Submit your answer to LMS

You might also like