A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt. (2 points)

True

False

The word hashing literally means to scramble. (2 points)

True

O False

9 answers

  1. A general property of a good encryption is good encryptions are easy to encrypt but very hard to decrypt.

    • True: Good encryption algorithms are designed to make the encryption process simple and efficient while making the decryption process difficult without the appropriate key.
  2. The word hashing literally means to scramble.

    • False: Hashing refers to the process of converting input data into a fixed-size string of characters, which is typically a sequence of numbers and letters. While the result may appear scrambled, the term "hashing" does not literally mean to scramble.
is the process of decrypting coded messages without being told the key. (2 points)

O Cryptography

Cryptology

Cryptanalysis

The practice of solving and writing encryptions is

cryptanalysis

cryptography

(2 points)



Ocryptology

is the output from any input that has been processed through a hashing algorithm/function. (2 points)

A

Digest

Collision

Firewalls
  1. The process of decrypting coded messages without being told the key.

    • Cryptanalysis: This is the correct term for the practice of decrypting coded messages without the key.
  2. The practice of solving and writing encryptions is

    • Cryptography: This term refers to the practice and study of techniques for securing communication, including both creating and solving encryptions.
  3. is the output from any input that has been processed through a hashing algorithm/function.

    • Digest: This is known as the hash value or digest generated from input data processed through a hashing algorithm.

So the answers are:

  1. Cryptanalysis
  2. Cryptography
  3. Digest
What is a collision in a hash function? (2 points)

There are few outputs, but a lot of inputs.

2 inputs map to the same output

There are few inputs, but a lot of outputs.

O2 outputs come from the same input

What do most attacks on hash functions involve?

A. Finding Collisions

B. Pre-generating millions of hashes and comparing them to the plain text that generates it.

C. Really good random guessing.

(2 points)

A and B

OA and C

Band C
  1. What is a collision in a hash function?

    • 2 inputs map to the same output: A collision in a hash function occurs when two different inputs produce the same output hash.
  2. What do most attacks on hash functions involve?

    • A and B: Most attacks on hash functions involve finding collisions (Option A), as well as pre-generating millions of hashes (using techniques like rainbow tables) and comparing them to the plaintext that generates it (Option B).

So the answers are:

  1. 2 inputs map to the same output
  2. A and B
In order to decrypt an encrypted message, pass the encrypted message and the decrypt function. (2 points) to the

Okey

O cryptology

Ocipertext

Odecrypted message

Hash functions got the name "hash" because it's easy to compute the Junction with a given input, but nearly impossible to reverse engineer the hash function to get the original input. (2 points)

O True

False
  1. In order to decrypt an encrypted message, pass the encrypted message and the decrypt function to the

    • Key: To decrypt an encrypted message, you typically need the encrypted message, the decryption function, and the key used for encryption.
  2. Hash functions got the name "hash" because it's easy to compute the function with a given input, but nearly impossible to reverse engineer the hash function to get the original input.

    • True: The statement reflects the fundamental properties of hash functions. They are designed to be fast to compute, while making it difficult or nearly impossible to reverse the process to retrieve the original input.

So the answers are:

  1. Key
  2. True
Cryptography is defined as: (2 points)

Sensitive information sent over networks that needs to be secured.

The practice of encoding information so only authorized people can read it.

Verified authority to view information, such as a password or key.

The act of stealing personal information online.

Cryptography is defined as:

  • The practice of encoding information so only authorized people can read it.

This definition accurately describes cryptography as it involves techniques to secure information by transforming it into a format that can only be understood by those who possess the appropriate key or authorization.