CIS 502 MENTOR Great Stories/cis502mentor.com CIS 502 MENTOR Great Stories/cis502mentor.com | Page 3
•
•
2
3
Public key cryptography is another name for:
A running-key cipher can be used when:
•
4
Two parties, Party A and Party B, regularly
exchange messages using public key cryptography. One party,
Party A, believes that its private encryption key has been
compromised. What action should Party B take?
•
5
Two parties that have never communicated
before wish to send messages using symmetric encryption key
cryptography. How should the parties begin?
•
6
A stream cipher encrypts data by XORing
plaintext with the encryption key. How is the ciphertext
converted back into plaintext?
•
7
Two parties that have never communicated before
wish to send messages using asymmetric key cryptography.
How should the parties begin?