{"id":4928,"date":"2023-06-23T03:31:02","date_gmt":"2023-06-23T03:31:02","guid":{"rendered":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/?post_type=chapter&#038;p=4928"},"modified":"2024-10-18T20:53:33","modified_gmt":"2024-10-18T20:53:33","slug":"cryptography-get-stronger","status":"web-only","type":"chapter","link":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/chapter\/cryptography-get-stronger\/","title":{"raw":"Cryptography: Get Stronger","rendered":"Cryptography: Get Stronger"},"content":{"raw":"<p>Evaluate and Compare Shared Symmetric-Key Methods<\/p>\r\n<ol style=\"list-style-type: decimal;\">\r\n\t<li>What is a substitution cipher? Provide an example.<\/li>\r\n\t<li>What is a transposition cipher? Provide an example.<\/li>\r\n\t<li>Decrypt the message \"WKLVLVDWHVW\" using a shift of three places.<\/li>\r\n\t<li>Decrypt the message \"HLEO LWROD\" using a simple columnar transposition.<\/li>\r\n\t<li>List two common vulnerabilities of symmetric-key ciphers.<\/li>\r\n\t<li>What are two advantages of using symmetric-key methods for encryption?<\/li>\r\n\t<li>What are key pairs in public key cryptography? How are they used?<\/li>\r\n\t<li>What is the purpose of digital signatures in public key cryptography?<\/li>\r\n\t<li>If the public key is [latex](e,n)=(5,14)[\/latex] and the private key is [latex](d,n)=(11,14)[\/latex], encrypt and then decrypt the message \"[latex]3[\/latex]\" using RSA.<\/li>\r\n\t<li>List two advantages of public key cryptography.<\/li>\r\n\t<li>List two disadvantages of public key cryptography.<\/li>\r\n\t<li>Compare the security of public key cryptography with symmetric-key methods.<\/li>\r\n\t<li>Compare the speed of encryption and decryption in public key cryptography with symmetric-key methods.<\/li>\r\n\t<li>Describe a real-world scenario where public key cryptography would be preferred over symmetric-key methods.<\/li>\r\n\t<li>Describe a real-world scenario where symmetric-key methods would be preferred over public key cryptography.<\/li>\r\n\t<li>KHow is key distribution handled in symmetric-key cryptography?<\/li>\r\n\t<li>How is key distribution handled in public key cryptography?<\/li>\r\n\t<li>What role do digital certificates play in public key cryptography?<\/li>\r\n\t<li>Briefly discuss a current trend or future direction in the field of cryptography that interests you.<\/li>\r\n<\/ol>","rendered":"<p>Evaluate and Compare Shared Symmetric-Key Methods<\/p>\n<ol style=\"list-style-type: decimal;\">\n<li>What is a substitution cipher? Provide an example.<\/li>\n<li>What is a transposition cipher? Provide an example.<\/li>\n<li>Decrypt the message &#8220;WKLVLVDWHVW&#8221; using a shift of three places.<\/li>\n<li>Decrypt the message &#8220;HLEO LWROD&#8221; using a simple columnar transposition.<\/li>\n<li>List two common vulnerabilities of symmetric-key ciphers.<\/li>\n<li>What are two advantages of using symmetric-key methods for encryption?<\/li>\n<li>What are key pairs in public key cryptography? How are they used?<\/li>\n<li>What is the purpose of digital signatures in public key cryptography?<\/li>\n<li>If the public key is [latex](e,n)=(5,14)[\/latex] and the private key is [latex](d,n)=(11,14)[\/latex], encrypt and then decrypt the message &#8220;[latex]3[\/latex]&#8221; using RSA.<\/li>\n<li>List two advantages of public key cryptography.<\/li>\n<li>List two disadvantages of public key cryptography.<\/li>\n<li>Compare the security of public key cryptography with symmetric-key methods.<\/li>\n<li>Compare the speed of encryption and decryption in public key cryptography with symmetric-key methods.<\/li>\n<li>Describe a real-world scenario where public key cryptography would be preferred over symmetric-key methods.<\/li>\n<li>Describe a real-world scenario where symmetric-key methods would be preferred over public key cryptography.<\/li>\n<li>KHow is key distribution handled in symmetric-key cryptography?<\/li>\n<li>How is key distribution handled in public key cryptography?<\/li>\n<li>What role do digital certificates play in public key cryptography?<\/li>\n<li>Briefly discuss a current trend or future direction in the field of cryptography that interests you.<\/li>\n<\/ol>\n","protected":false},"author":23,"menu_order":14,"template":"","meta":{"_candela_citation":"[]","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"part":2245,"module-header":"practice","content_attributions":[],"internal_book_links":[],"video_content":null,"cc_video_embed_content":{"cc_scripts":"","media_targets":[]},"try_it_collection":null,"_links":{"self":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters\/4928"}],"collection":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/users\/23"}],"version-history":[{"count":6,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters\/4928\/revisions"}],"predecessor-version":[{"id":13518,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters\/4928\/revisions\/13518"}],"part":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/parts\/2245"}],"metadata":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapters\/4928\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/media?parent=4928"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/pressbooks\/v2\/chapter-type?post=4928"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/contributor?post=4928"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/content.one.lumenlearning.com\/quantitativereasoning\/wp-json\/wp\/v2\/license?post=4928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}