Cryptography is defined as:(2 points)

Responses

The practice of encoding information so only authorized people can read it.
The practice of encoding information so only authorized people can read it.

Sensitive information sent over networks that needs to be secured.
Sensitive information sent over networks that needs to be secured.

The act of stealing personal information online.
The act of stealing personal information online.

Verified authority to view information, such as a password or key.
Verified authority to view information, such as a password or key.
Question 2
In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.(2 points)
Responses

cryptology
cryptology

decrypted message
decrypted message

cipertext
cipertext

key
key
Question 3
Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input. (2 points)
Responses

True
True

False
False
Question 4
What is a collision in a hash function?(2 points)
Responses

There are few outputs, but a lot of inputs.
There are few outputs, but a lot of inputs.

2 outputs come from the same input
2 outputs come from the same input

There are few inputs, but a lot of outputs.
There are few inputs, but a lot of outputs.

2 inputs map to the same output
2 inputs map to the same output
Question 5
What do most attacks on hash functions involve?

A. Finding Collisions
B. Pre-generating millions of hashes and comparing them to the plain text that generates it.
C. Really good random guessing.

(2 points)
Responses

A and B
A and B

A and C
A and C

B and C
B and C
Question 6
_____________ is the process of decrypting coded messages without being told the key.(2 points)
Responses

Cryptography
Cryptography

Cryptology
Cryptology

Cryptanalysis
Cryptanalysis
Question 7
The practice of solving and writing encryptions is ______________.(2 points)
Responses

cryptography
cryptography

cryptology
cryptology

cryptanalysis
cryptanalysis
Question 8
________________ is the output from any input that has been processed through a hashing algorithm/function.(2 points)
Responses

Digest
Digest

Collision
Collision

Firewalls
Firewalls
Question 9
A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.(2 points)
Responses

True
True

False
False
Question 10
The word hashing literally means to scramble.(2 points)
Responses

True
True

False

1 answer

Here are the answers to your cryptography questions:

  1. Cryptography is defined as:

    • Answer: The practice of encoding information so only authorized people can read it.
  2. In order to decrypt an encrypted message, pass the encrypted message and the _____________ to the decrypt function.

    • Answer: key
  3. Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.

    • Answer: True
  4. What is a collision in a hash function?

    • Answer: 2 inputs map to the same output.
  5. What do most attacks on hash functions involve?

    • Answer: A and B
  6. _____________ is the process of decrypting coded messages without being told the key.

    • Answer: Cryptanalysis
  7. The practice of solving and writing encryptions is ______________.

    • Answer: cryptography
  8. ________________ is the output from any input that has been processed through a hashing algorithm/function.

    • Answer: Digest
  9. A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.

    • Answer: True
  10. The word hashing literally means to scramble.

    • Answer: True

Feel free to reach out if you need further clarification or additional information!