{"id":38,"date":"2025-01-02T23:03:45","date_gmt":"2025-01-02T23:03:45","guid":{"rendered":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/chapter\/cryptography-get-stronger-answer-key\/"},"modified":"2025-01-02T23:03:45","modified_gmt":"2025-01-02T23:03:45","slug":"cryptography-get-stronger-answer-key","status":"publish","type":"chapter","link":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/chapter\/cryptography-get-stronger-answer-key\/","title":{"raw":"Cryptography: Get Stronger Answer Key","rendered":"Cryptography: Get Stronger Answer Key"},"content":{"raw":"\n<ol style=\"list-style-type: decimal;\">\n \t<li>A substitution cipher replaces each letter of the plaintext with a letter found by moving [latex]n[\/latex] places down or up the alphabet. Example: Using a shift of 3, \"ABC\" becomes \"DEF.\"<\/li>\n \t<li>A transposition cipher rearranges the letters of the plaintext. Example: \"HELLO\" can become \"HLELO.\"<\/li>\n \t<li>\"THISISATEST\"<\/li>\n \t<li>\"HELLO WORLD\"<\/li>\n \t<li>Key distribution problems, Susceptibility to brute-force attacks.<\/li>\n \t<li>Faster encryption\/decryption, Simpler algorithms.<\/li>\n \t<li>Key pairs consist of a public key (for encryption) and a private key (for decryption). The public key is shared openly, while the private key remains secret.<\/li>\n \t<li>To verify the authenticity of a message or document.<\/li>\n \t<li>Encrypted: [latex]13[\/latex], Decrypted: [latex]3[\/latex]<\/li>\n \t<li>Enhanced security, Simplified key distribution.<\/li>\n \t<li>Slower than symmetric-key methods, More complex algorithms.<\/li>\n \t<li>Public key cryptography generally offers higher security but depends on key size and implementation.<\/li>\n \t<li>Symmetric-key methods are generally faster than public key cryptography.<\/li>\n \t<li>Secure email communication, where key distribution is a challenge.<\/li>\n \t<li>High-speed network encryption where both parties already share a secret key.<\/li>\n \t<li>Keys must be securely shared between parties, often using a secure channel or trusted third party<\/li>\n \t<li>Public keys can be openly shared, while private keys remain secret. Digital certificates can facilitate secure key distribution.<\/li>\n \t<li>Digital certificates verify the authenticity of public keys, linking them to the entities that own them.<\/li>\n \t<li>Answers may vary; students might discuss quantum cryptography, blockchain technology, or other emerging trends.<\/li>\n<\/ol>\n\n","rendered":"<ol style=\"list-style-type: decimal;\">\n<li>A substitution cipher replaces each letter of the plaintext with a letter found by moving [latex]n[\/latex] places down or up the alphabet. Example: Using a shift of 3, &#8220;ABC&#8221; becomes &#8220;DEF.&#8221;<\/li>\n<li>A transposition cipher rearranges the letters of the plaintext. Example: &#8220;HELLO&#8221; can become &#8220;HLELO.&#8221;<\/li>\n<li>&#8220;THISISATEST&#8221;<\/li>\n<li>&#8220;HELLO WORLD&#8221;<\/li>\n<li>Key distribution problems, Susceptibility to brute-force attacks.<\/li>\n<li>Faster encryption\/decryption, Simpler algorithms.<\/li>\n<li>Key pairs consist of a public key (for encryption) and a private key (for decryption). The public key is shared openly, while the private key remains secret.<\/li>\n<li>To verify the authenticity of a message or document.<\/li>\n<li>Encrypted: [latex]13[\/latex], Decrypted: [latex]3[\/latex]<\/li>\n<li>Enhanced security, Simplified key distribution.<\/li>\n<li>Slower than symmetric-key methods, More complex algorithms.<\/li>\n<li>Public key cryptography generally offers higher security but depends on key size and implementation.<\/li>\n<li>Symmetric-key methods are generally faster than public key cryptography.<\/li>\n<li>Secure email communication, where key distribution is a challenge.<\/li>\n<li>High-speed network encryption where both parties already share a secret key.<\/li>\n<li>Keys must be securely shared between parties, often using a secure channel or trusted third party<\/li>\n<li>Public keys can be openly shared, while private keys remain secret. Digital certificates can facilitate secure key distribution.<\/li>\n<li>Digital certificates verify the authenticity of public keys, linking them to the entities that own them.<\/li>\n<li>Answers may vary; students might discuss quantum cryptography, blockchain technology, or other emerging trends.<\/li>\n<\/ol>\n","protected":false},"author":6,"menu_order":8,"template":"","meta":{"_candela_citation":"[]","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"part":3,"module-header":"","content_attributions":[],"internal_book_links":[],"video_content":null,"cc_video_embed_content":{"cc_scripts":"","media_targets":[]},"try_it_collection":null,"_links":{"self":[{"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/pressbooks\/v2\/chapters\/38"}],"collection":[{"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/wp\/v2\/users\/6"}],"version-history":[{"count":0,"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/pressbooks\/v2\/chapters\/38\/revisions"}],"part":[{"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/pressbooks\/v2\/parts\/3"}],"metadata":[{"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/pressbooks\/v2\/chapters\/38\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/wp\/v2\/media?parent=38"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/pressbooks\/v2\/chapter-type?post=38"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/wp\/v2\/contributor?post=38"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/qrpracticepages\/wp-json\/wp\/v2\/license?post=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}