•
3
A running-key cipher can be used when:
•
4
Two parties, Party A and Party B, regularly
exchange messages using public key cryptography. One party,
Party A, believes that its private encryption key has been
compromised. What action should Party B take?
•
5
Two parties that have never
communicated before wish to send messages using symmetric
encryption key cryptography. How should the parties begin?
•
6
A stream cipher encrypts data by XORing
plaintext with the encryption key. How is the ciphertext
converted back into plaintext?
•
•
•
7
Two parties that have never communicated
before wish to send messages using asymmetric key
cryptography. How should the parties begin?
8
9
The Advanced Encryption Standard is another
name for which cipher:
All of the following statements about the
polyalphabetic cipher are true EXCEPT: