Evaluate and Compare Shared Symmetric-Key Methods
- What is a substitution cipher? Provide an example.
- What is a transposition cipher? Provide an example.
- Decrypt the message “WKLVLVDWHVW” using a shift of three places.
- Decrypt the message “HLEO LWROD” using a simple columnar transposition.
- List two common vulnerabilities of symmetric-key ciphers.
- What are two advantages of using symmetric-key methods for encryption?
- What are key pairs in public key cryptography? How are they used?
- What is the purpose of digital signatures in public key cryptography?
- If the public key is [latex](e,n)=(5,14)[/latex] and the private key is [latex](d,n)=(11,14)[/latex], encrypt and then decrypt the message “[latex]3[/latex]” using RSA.
- List two advantages of public key cryptography.
- List two disadvantages of public key cryptography.
- Compare the security of public key cryptography with symmetric-key methods.
- Compare the speed of encryption and decryption in public key cryptography with symmetric-key methods.
- Describe a real-world scenario where public key cryptography would be preferred over symmetric-key methods.
- Describe a real-world scenario where symmetric-key methods would be preferred over public key cryptography.
- KHow is key distribution handled in symmetric-key cryptography?
- How is key distribution handled in public key cryptography?
- What role do digital certificates play in public key cryptography?
- Briefly discuss a current trend or future direction in the field of cryptography that interests you.