The primary difference between today’s cryptographic methods and those of 60 years ago is our ________________.

The primary difference between today’s cryptographic methods and those of 60 years ago is our ________________.
use of substitution ciphers
use of symmetric keys
reliance on computers and complex mathematics
reliance on transposition ciphers
Reason
Symmetrical ciphers work on __________ of information.
blocks or continuous streams
bits or bytes
packets
sectors or rounds
Reason
A drawback of a symmetrical key system is that the___________.
number of keys can grow very large
keys can be discovered easily
keys are non-changing
keys are public
Reason
Block ciphers are weaker than stream ciphers. True/False.
Justification
Because the key space of the algorithm is so small, ________ is no longer considered computationally secure.
DES
RSA
TEA
Diffie-Hellman
Reason
Asymmetrical encryption is commonly used for all of the following EXCEPT ____.
e-mail encryption
digital signatures
on-line purchases
code signing
Reason
What is the most important benefit of asymmetrical encryption?
It speeds up the encryption process.
It makes e-mail easier to encode.
Only the sender knows to whom the information is going.
Messages can be transmitted openly and only the receiver can decrypt the information
Reason
What permits interoperability between certificate authorities?
content filtering
policy mapping
trust distribution
exchange authentication
Reason
Justify your answer. [50-100 words, references optional] [5 points]
It is necessary to keep cryptographic algorithms private. True or False
10 Describe VPN , include but not limited to technology , protocols etc. (150-200 words) [5 points]

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: