Hashing Functions Require The Use Of Keys.
Question: The science of encryption is known as ____________________.
Answer: cryptology
Question: ____________________ is the process of making and using codes to secure the transmission of information.
Answer: Cryptography
Question: ___ algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption.
Answer: Cipher
Question: To ____________________ means to encrypt, encode, or convert plaintext into the equivalent ciphertext.
Answer: encipher
Question: The process of hiding messages within the digital encoding of a picture or graphic is called ____________________.
Answer: steganography
Question: To use a(n) ____________________ cipher, you substitute one value for another.
Answer: substitution
Question: A(n) ____________________ substitution uses one alphabet.
Answer: monoalphabetic
Question: The ____________________ cipher simply rearranges the values within a block to create the ciphertext.
Answer: transposition
permutation
Question: The ____________________ OR operation is a function of Boolean algebra in which two bits are compared, and if the two bits are identical, the result is a binary 0.
Answer: exclusive
Question: Also known as the one-time pad, the ____________________ cipher, which was developed at AT&T, uses a set of characters only one time for each encryption process.
Answer: Vernam