CIS 502 MENTOR Future Starts Here/cis502mentor.com CIS 502 MENTOR Future Starts Here/cis502mentor.com | Page 3

• 3 A running-key cipher can be used when: • 4 Two parties, Party A and Party B, regularly exchange messages using public key cryptography. One party, Party A, believes that its private encryption key has been compromised. What action should Party B take? • 5 Two parties that have never communicated before wish to send messages using symmetric encryption key cryptography. How should the parties begin? • 6 A stream cipher encrypts data by XORing plaintext with the encryption key. How is the ciphertext converted back into plaintext? • • • 7 Two parties that have never communicated before wish to send messages using asymmetric key cryptography. How should the parties begin? 8 9 The Advanced Encryption Standard is another name for which cipher: All of the following statements about the polyalphabetic cipher are true EXCEPT: