

Applied Cryptography Review Questions
Course Introduction
Applied Cryptography explores the practical aspects of securing communications and data through cryptographic methods. The course covers fundamental concepts such as symmetric and asymmetric encryption, hash functions, digital signatures, key exchange protocols, and cryptographic authentication. Students will analyze real-world cryptographic systems, address implementation challenges, and study protocols used in modern applications like secure email, online banking, and blockchain technologies. Emphasis is placed on understanding vulnerabilities, best practices for deployment, and the balance between security and efficiency in real systems.
Recommended Textbook Cryptography and Network Security 6th Edition by William Stallings
Available Study Resources on Quizplus
20 Chapters
842 Verified Questions
842 Flashcards
Source URL: https://quizplus.com/study-set/3983

Page 2

Chapter 1: Overview
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80023
Sample Questions
Q1) In the context of network security,___________ is the ability to limit and control the access to host systems and applications via communications links.
Answer: access control
Q2) __________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.
A)Disruption
B)Replay
C)Service denial
D)Masquerade
Answer: B
Q3) __________ is the use of a trusted third party to assure certain properties of a data exchange.
Answer: Notarization
Q4) Patient allergy information is an example of an asset with a high requirement for integrity.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Chapter 2: Classical Encryption Techniques
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80022
Sample Questions
Q1) Ciphertext generated using a computationally secure encryption scheme is impossible for an opponent to decrypt simply because the required information is not there.
A)True
B)False
Answer: False
Q2) A technique for hiding a secret message within a larger document or picture in such a way that others cannot discern the presence or contents of the hidden message is
Answer: Steganography
Q3) When using symmetric encryption it is very important to keep the algorithm secret.
A)True
B)False
Answer: False
Q4) Steganography renders the message unintelligible to outsiders by various transformations of the text.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Block Ciphers and the Data Encryption Standard
Available Study Resources on Quizplus for this Chatper
27 Verified Questions
27 Flashcards
Source URL: https://quizplus.com/quiz/80021
Sample Questions
Q1) Two alternatives to DES are AES and _________ DES. Answer: triple
Q2) Feistel's is a practical application of a proposal by Claude Shannon to develop a product cipher that alternates confusion and ________ functions.
Answer: diffusion
Q3) In ___________ the statistical structure of the plaintext is dissipated into long-range statistics of the ciphertext.This is achieved by having each plaintext digit affect the value of many ciphertext digits.
Answer: diffusion
Q4) Fast software encryption/decryption and ease of analysis are two considerations in the design of a Feistel cipher.
A)True
B)False
Answer: True
Q5) The heart of a Feistel block cipher is the function F,which relies on the use of S-boxes. A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Basic Concepts in Number Theory and Finite
Fields
Available Study Resources on Quizplus for this Chatper
26 Verified Questions
26 Flashcards
Source URL: https://quizplus.com/quiz/80020
Sample Questions
Q1) A ring is said to be _________ if it satisfies the condition ab = ba for all a,b in R.
A)cyclic
B)commutative
C)abelian
D)infinite
Q2) The polynomial cx)is said to be the __________ of ax)and bx)if cx)divides both ax)and bx)and any divisor of ax)and bx)is a divisor of cx).
Q3) In the context of abstract algebra we are usually not interested in evaluating a polynomial for a particular value of x.To emphasize this point the variable x is sometimes referred to as the __________ .
A)monic
B)constant
C)indeterminate
D)coefficient
Q4) Polynomial arithmetic includes the operations of addition, subtraction and multiplication.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Advanced Encryption Standard
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80019
Sample Questions
Q1) The Advanced Encryption Standard was published by the __________ in 2001.
A)ARK
B)FIPS
C)IEEE
D)NIST
Q2) The first row of State is not altered;for the second row a 1-byte circular left shift is performed;for the third row a 2-byte circular left shift is performed;and for the fourth row a 3-byte circular left shift is performed.This transformation is called __________ .
A)AddRoundKey
B)ShiftRows
C)MixColumns
D)Substitute bytes
Q3) In the AES structure both encryption and decryption ciphers begin with an) __________ stage,followed by nine rounds that each include all four stages, followed by a tenth round of three stages.
A)Substitute bytes
B)AddRoundKey
C)MixColumns
D)ShiftRows
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Block Cipher Operation
Available Study Resources on Quizplus for this Chatper
44 Verified Questions
44 Flashcards
Source URL: https://quizplus.com/quiz/80018
Sample Questions
Q1) There are no practical cryptanalytic attacks on 3DES.
A)True
B)False
Q2) The plaintext of a sector or data unit is organized in to blocks of 128 bits.For encryption and decryption,each block is treated independently.The only exception occurs when the last block has less than 128 bits.In that case the last two blocks are encrypted/decrypted using a ___________ technique instead of padding.
Q3) Cipher Feedback Mode conforms to the typical construction of a stream cipher.
A)True
B)False
Q4) One of the most widely used multiple-encryption scheme is __________ .
Q5) The __________ method is ideal for a short amount of data and is the appropriate mode to use if you want to transmit a DES or AES key securely.
A)cipher feedback mode
B)counter mode
C)output feedback mode
D)electronic codebook mode
Q6) The__________ is a technique in which an encryption algorithm is used multiple times.
Page 8
To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Random and Pseudorandom Number
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80017
Sample Questions
Q1) A __________ uses a nondeterministic source to produce randomness.
A)CSPRBG
B)TRNG
C)PRNG
D)BBS
Q2) Two approaches that use a block cipher to build a PNRG and have gained widespread acceptance are:
A)CTR mode and CFB mode
B)CTR mode and OFB mode
C)CBC mode and CFB mode
D)OFB mode and ECB mode
Q3) A fundamental requirement of the RSA public-key encryption scheme is the ability to generate _________ numbers.
Q4) A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test.
A)True
B)False
Q5) __________ algorithms are designed specifically and solely for the purpose of generating pseudorandom bit streams.
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: More Number Theory
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80016
Sample Questions
Q1) A _________ number can only be divided by +/- values of itself and 1 and cannot have a remainder.
A)prime
B)composite
C)indexed
D)positive
Q2) All integers have primitive roots.
A)True
B)False
Q3) The mapping of the CRT equation is a one-to-one correspondence called a _________ between Zm and the Cartesian product Zm1 X Zm2 X ...X Zmk.
Q4) The _________ algorithm is typically used to test a large number for primality.
A)Rijndael
B)Fermat
C)Miller-Rabin
D)Euler
Q5) __________ theorem states the following: If p is prime and a is a positive integer not divisible by p,then ap-1 = 1mod p).
Q6) Two numbers are __________ if their greatest common divisor is 1.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Public-Key Cryptography and Rsa
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80015
Sample Questions
Q1) A __________ is one that maps a domain into a range such that every function value has a unique inverse,with the condition that the calculation of the function is easy,whereas the calculation of the inverse is infeasible.
Q2) The __________ is a set of policies,processes,server platforms,software and workstations used for the purpose of administering certificates and public-private key pairs,including the ability to issue,maintain,and revoke public key certificates.
Q3) A __________ is a cryptographic algorithm that uses two related keys,a public key and a private key.The two keys have the property that deriving the private key from the public key is computationally infeasible.
A)Private Key Symmetric Cryptographic Algorithm
B)Key Exchange Cryptographic Algorithm
C)Public Key Asymmetric Cryptographic Algorithm
D)RSA Digital Cryptographic Algorithm
Q4) Public-key cryptography is asymmetric,involving the use of two separate keys,in contrast to ___________ encryption,which uses only one key.
Q5) __________ encryption is a form of cryptosystem in which encryption and decryption are performed using a public key and a private key.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Other Public-Key Cryptosystems
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80014
Sample Questions
Q1) The __________ key exchange involves multiplying pairs of nonzero integers modulo a prime number q.Keys are generated by exponentiation over the group with exponentiation defined as repeated multiplication.
A)Diffie-Hellman
B)Rabin-Miller
C)Micali-Schnorr
D)ElGamal
Q2) The purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.
Q3) Asymmetric algorithms are typically much slower than symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.
Q4) The Diffie-Hellman key exchange is a simple public-key algorithm.
A)True
B)False
Q5) Most of the products and standards that use public-key cryptography for encryption and digital signatures use RSA.
A)True B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Cryptographic Hash Functions
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80013
Sample Questions
Q1) Big-endian format is the most significant byte of a word in the low-address byte position.
A)True B)False
Q2) A good hash function has the property that the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random.
A)True
B)False
Q3) An ideal hash algorithm will require a cryptanalytic effort __________ the brute-force effort.
A)less than or equal to B)greater than or equal to C)less than D)greater than
Q4) Message authentication is achieved using a __________ .
A)DES
B)MDF
C)SHA
D)MAC
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Message Authentication Codes
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80012
Sample Questions
Q1) Any modification to a sequence of messages between parties,including insertion,deletion,and reordering is a __________ attack.
Q2) The MAC function is a __________ function.
A)one-to-many
B)many-to-one
C)one-to-one
D)one-to-two
Q3) The HtE approach is used in the __________ protocol to protect WiFi networks.
Q4) As with encryption algorithms and hash functions cryptanalytic attacks on MAC algorithms seek to exploit some property of the algorithm to perform some attack other than an exhaustive search.
A)True
B)False
Q5) The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.
A)True
B)False
Q6) NIST SP 800-90,IEEE 802.11i,and TLS/WTLS are three ____________ based on HMAC.
Q7) Discovery of the pattern of traffic between parties is a __________ attack.
Page 14
To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Digital Signatures
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80011
Sample Questions
Q1) A digital signature can guarantee the integrity but not the source of the message.
A)True
B)False
Q2) _________ specifies that if the signature generation process results in a value of s = 0 a new value of k should be generated and the signature should be recalculated.
Q3) The DSS approach makes use of a hash function.
A)True
B)False
Q4) With a __________ attack the attacker is given access to a set of messages and their signatures.
A)known message
B)key-only
C)directed chosen message
D)generic chosen message
Q5) The global public key components for DSA are p,q,and h.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Key Management and Distribution
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80010
Sample Questions
Q1) If encryption is done at the __________ level a key is needed for every pair of users or processes that require communication.
Q2) The principal objective for developing a _________ is to enable secure,convenient and efficient acquisition of public keys.
A)KDC
B)IETF
C)PKI
D)CRL
Q3) Communication between end systems is encrypted using a _________ key.
A)session
B)master
C)permanent
D)message
Q4) X.509 defines the format for private-key certificates.
A)True
B)False
Q5) __________ certificates are used in most network security applications including IP security,transport layer security and S/MIME.
To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: User Authentication Protocols
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80009
Sample Questions
Q1) The _________ is responsible for generating keys to be used for a short time over a connection between two parties and for distributing those keys using the master keys to protect the distribution.
Q2) The first published report on Kerberos listed the following requirements: secure,reliable,scalable and __________ .
Q3) Examples of dynamic biometrics include recognition by fingerprint, retina,and face.
A)True
B)False
Q4) A solution,which eliminates the burden of each server having to confirm the identities of clients who request service,is to use an __________ that knows the passwords of all users and stores these in a centralized database and shares a unique secret key with each server.
Q5) A common item of authentication information associated with a user is a
A)nonce
B)timestamp
C)ticket
D)password
To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Network Access Control and Cloud Security
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80008
Sample Questions
Q1) _________ is a client computer that is attempting to access a network.
A)EAP peer
B)PSK
C)NAC
D)RAS
Q2) The Cloud Security Alliance defines _______ as the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.
Q3) A _________ is a person or organization that maintains a business relationship with,and uses service from,cloud providers.
A)cloud auditor
B)cloud broker
C)cloud carrier
D)cloud consumer
Q4) _________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.
Q5) __________ are third party audits of cloud services.
To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 17: Transport-Level Security
Available Study Resources on Quizplus for this Chatper
26 Verified Questions
26 Flashcards
Source URL: https://quizplus.com/quiz/80007
Sample Questions
Q1) _________ attacks include impersonating another user,altering messages in transit between client and server and altering information on a Web site.
A)Active
B)Passive
C)Shell
D)Psuedo
Q2) The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets.
A)True
B)False
Q3) __________ provides security services between Transport Layer Protocol and applications that use TCP.
Q4) Phase _________ of the Handshake Protocol establishes security capabilities.
A)4
B)1
C)2
D)3
Q5) A signature is created by taking the hash of a message and encrypting it with the sender's _________ .
To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Wireless Network Security
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80006
Sample Questions
Q1) The DS can be a switch,a wired network,or a wireless network.
A)True
B)False
Q2) In simple terms,the wireless environment consists of three components that provide point of attack: the endpoint,the ______________,and the access point.
Q3) Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.
A)True
B)False
Q4) The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.
A)True
B)False
Q5) An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.
Q6) The MPDU authentication phase consists of three phases.They are: connect to AS,EAP exchange and _________ .
To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 19: Electronic Mail Security
Available Study Resources on Quizplus for this Chatper
45 Verified Questions
45 Flashcards
Source URL: https://quizplus.com/quiz/80005
Sample Questions
Q1) A means of generating predictable PGP session keys is needed.
A)True
B)False
Q2) Computed by PGP,a _________ field indicates the extent to which PGP will trust that this is a valid public key for this user;the higher the level of trust,the stronger the binding of this user ID to this key.
Q3) __________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP.
A)S/MIME
B)MIME
C)DKIM
D)HTTPS
Q4) PGP provides confidentiality through the use of asymmetric block encryption.
A)True
B)False
Q5) E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 20: Ip Security
Available Study Resources on Quizplus for this Chatper
44 Verified Questions
44 Flashcards
Source URL: https://quizplus.com/quiz/80004
Sample Questions
Q1) Both tunnel and transport modes can be accommodated by the encapsulating security payload encryption format.
A)True
B)False
Q2) The term _________ refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services.
Q3) By implementing security at the IP level an organization can ensure secure networking not only for applications that have security mechanisms but also for the many security ignorant applications.
A)True
B)False
Q4) Transport mode provides protection to the entire IP packet.
A)True
B)False
Q5) The default automated key management protocol for IPsec is referred to as ISAKMP/Oakley.
A)True B)False
Q6) Authentication makes use of the _________ message authentication code.
Page 22
To view all questions and flashcards with answers, click on the resource link above.