Alice sends a message to Bob, along with a digital signature for the message. Which key did Alice use to generate this digital signature?
The input to a simple encryption algorithm is a block of eig…
The input to a simple encryption algorithm is a block of eight (8) bits, which we can represent as ABCDEFGH. The result of a circular shift of 3 positions to the right on this data block can be represented as .
The effective size of a key in the Data Encryption Standard…
The effective size of a key in the Data Encryption Standard (DES) algorithm is 56 bits. Explain in words how to calculate the size of the DES keyspace.
A scheme developed by Whit Diffie, Martin Hellman, and Ralph…
A scheme developed by Whit Diffie, Martin Hellman, and Ralph Merkle is commonly called “Diffie‑Hellman”. What does this scheme directly enable?
Suppose that a hacker is able to log into the administrative…
Suppose that a hacker is able to log into the administrative account for a webserver and change the configuration so that it does not accept incoming connections. The hacker’s actions are an attack on the of the webserver. Hint: The answer is the name of a cybersecurity service.
Honor code declarationYou MUST NOT use anything during this…
Honor code declarationYou MUST NOT use anything during this exam except a notes page as explain under IT366 Final Exam | Overview.Read the following statement: —- I am familiar with the requirements of the Mason Honor Code.I have complied with those requirements in all respects in relation to this exam.I hereby declare that the following work is entirely my own and has been completed in accordance with the directions of the Instructor and exam supervisor(s).—-Write your full name on the first line and your Mason G Number on the second line in the text box below to make the above declaration.(No points, but your exam will not be graded if you do not complete this question.)
In a Feistel cipher, the substitution operation is bitwise e…
In a Feistel cipher, the substitution operation is bitwise exclusive disjunction (XOR). The inverse operation is bitwise inclusive disjunction (OR).
Alice wants to use RSA encryption/decryption. What is the f…
Alice wants to use RSA encryption/decryption. What is the first step she needs to perform to generate a key pair?
If an attack allows data within a system to be read by the a…
If an attack allows data within a system to be read by the attacker but does not change any of the data in the system, the attack should be categorized as …
Suppose that someone in your neighborhood is monitoring your…
Suppose that someone in your neighborhood is monitoring your Wi‑Fi. The payload of every data packet is encrypted, so that person cannot read your data. They notice that every time you send several packets to a certain IP address, one or more packages from Amazon are delivered the next day. The next time you interact with that website, they watch your porch the next day and steal some packages. That person’s process of monitoring your Wi‑Fi and concluding it is related to Amazon deliveries is best categorized as …