B: The size of the keyspace does not have a direct correlation to the strength of the crypto system. The keyspace is simply the range of values defined by the algorithm that can be used to construct keys.
C: Availability is not a goal of cryptography.
D: A polyalphabetic cipher is subject to cracking by means of period analysis.
B: The strength of a cryptosystem is not based on the length of the plaintext or even the content of the plaintext. The message to be encrypted is not a determining factor in the strength of a cryptosystem.
C: Availability is not a goal of cryptosystems. Cryptosystems do not address the need to make resources available, accessible, or delivered in a timely manner. The goals of cryptosystems is to provide for confidentiality, non-repudiation, integrity, and authenticity.
D: Block ciphering is the action of dividing a plaintext message into fixed length segments and applying the same algorithm to each segment to hide the message.
A: A cryptogram or ciphertext is an unintelligible message - it is a plaintext that has been transformed into a protected message through the application of cryptography.
A: Cryptology is the one item from this list different from the others since it is the parent concept that contains the others. Cryptology is a method of storing and transmitting data in a form that can be read and processed only by the intended recipient.
B: The process of hiding the meaning of a message by using a mechanism which shifts each letter of the alphabet by three letters is known as a monoalphabetic substitution cipher.
C: A cryptosystem may use a one way mathematical function as its algorithm, but not all algorithms are one way. A one way hash is used to check integrity but not for confidentiality.
A: Steganography is the cryptography mechanism which hides information within images.
B: AES is the replacement for 3DES.
C: Cryptography is art and science of hiding the meaning of communications from unintended recipients. However, this is an incomplete answer for this question since there are additional ways to perform this activity.
D: Cryptanalysis is the art of obtaining the plaintext (i.e. the original message) or the key from ciphertext.
D: The set of mathematical rules that dictate how enciphering and deciphering take place is known as the algorithm.
A: The key of a cryptosystem must be kept secret in order to protect the security provided by encryption.
B: End-to-end encryption performs its encryption at the application layer.
D: Link encryption performs its encryption at the network layer.
D: Exclusive OR is the most common mathematical Boolean operation performed by cryptographic systems.
A: One-time pads are not suitable for modern applications, primarily due to the inability for a computer to create truly non-repeating random codes and the problem of securely exchanging the pad with communication partners.
B: Clustering occurs when the same ciphertext is produced when a single plaintext is encrypted using two different keys.
C: A code cipher or just a code is a cryptographic transformation that operates as the word or phrase level.
D: End-to-end encryption is a form of communications encryption where the data is encrypted for the entire trip across an untrusted network from source to destination.
A: Link encryption encrypts the entire packet.