I. Explain how cryptography and cryptanalysis provide a sophisticated approach to security. 2. Explain how the science
Question:
I. Explain how cryptography and cryptanalysis provide a sophisticated approach to security.
2. Explain how the science of encryption, known as cryptology, encompasses cryptography and cryptanalysis.
3. Explain how today many common IT tools use embedded encryption technologies to protect sensitive information within applications.
4. Explain how a plaintext can be encrypted through one of two methods, the bit stream method or the block cipher method.
5. Explain how in a substitution cipher, you substitute one value for another.
6. Describe a type of substitution based on a monoalphabetic substitution only uses one alphabet.
7. Explain that hash functions are mathematical algorithms used to confirm the identity of a specific message and confirm that the content has not been changed.
8. Describe how symmetric encryption uses the same key, also known as a secret key, to encrypt and decrypt a message.
9. Explain how symmetric encryption methods can be extremely efficient, requiring minimal processing to either encrypt or decrypt the message.
10. Explain how asymmetric encryption is a category of encryption techniques also known as public-key encryption.
Introduction to Management Accounting
ISBN: 978-0133058789
16th edition
Authors: Charles Horngren, Gary Sundem, Jeff Schatzberg, Dave Burgsta