Deck 5: Basic Cryptography

ملء الشاشة (f)
exit full mode
سؤال
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

A)Substitution
B)Block
C)Loop
D)Sponge
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A Hardware Security Module (HSM) is essentially a chip on the motherboard of the computer that provides cryptographic services.
سؤال
The asymmetric cryptography algorithm most commonly used is:

A)AES
B)RSA
C)Twofish
D)Blowfish
سؤال
A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.
سؤال
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

A)RSA
B)SHA1
C)MD5
D)MD2
سؤال
A block cipher works on a single character at a time, and is faster than a stream cipher.
سؤال
What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?

A)GPG
B)OGP
C)CGP
D)GPP
سؤال
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

A)AES
B)Twofish
C)3DES
D)RSA
سؤال
Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?

A)Reactive cryptography
B)Symmetric cryptography
C)Analog cryptography
D)Quantum cryptography
سؤال
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

A)Confidentiality
B)Availability
C)Encryption
D)Integrity
سؤال
Which of the following is not one of the functions of a digital signature?

A)Verification of the sender
B)Prevention of the sender from disowning the message
C)Prove the integrity of the message
D)Protect the public key
سؤال
Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.
سؤال
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?

A)RSA
B)AES
C)Blowfish
D)3DES
سؤال
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
سؤال
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

A)shift
B)substitution
C)lock
D)loop
سؤال
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

A)FCC
B)RSA
C)ECC
D)IKE
سؤال
Data that is in an unencrypted form is referred to as which of the following?

A)Plaintext
B)Plain text
C)Simpletext
D)Cleartext
سؤال
What type of cryptography uses two keys instead of just one, generating both a private and a public key?

A)Symmetric
B)Asymmetric
C)Shared
D)Open
سؤال
What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?

A)Twofish
B)Blowfish
C)Whirlpool
D)Rijndal
سؤال
If using the MD5 hashing algorithm, what is the length to which each message is padded?

A)32 bits
B)64 bits
C)128 bits
D)512 bits
سؤال
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
​Match the following terms to the appropriate definitions.​
سؤال
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An algorithm that takes one character and replaces it with one character.
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A temporary key that is used only once before it is discarded.​
سؤال
A key that is generated by a symmetric cryptographic algorithm is said to be a:

A)private key
B)public key
C)symmetric key
D)shared key
سؤال
What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data?

A)hash
B)key
C)digest
D)block
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A cipher that manipulates an entire block of plaintext at one time.​
سؤال
On what principle did Julius Caesar's cryptographic messages function?

A)Each alphabetic letter was replaced by a corresponding number
B)Each alphabetic letter was represented by a seemingly random symbol
C)Each alphabetic letter was shifted three places down in the alphabet
D)Each alphabetic letter was shifted 5 places up in the alphabet.
سؤال
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
سؤال
The SHA-1 hashing algorithm creates a digest that is how many bits in length?

A)​96 bits
B)​128 bits
C)​160 bits
D)​192 bits
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.​
سؤال
Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:

A)AES
B)3DES
C)RSA
D)Twofish
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
سؤال
The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

A)matrix-based
B)lattice-based
C)linear
D)quantum
سؤال
A ________________ involves combining plaintext with a random key to create ciphertext that cannot be broken mathematically.​
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An algorithm that uses elliptic curves instead of prime numbers to compute keys
سؤال
The Data Encryption Standard is a(n) ______________ cipher.
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An asymmetric encryption key that does not have to be protected.​
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An asymmetric encryption key that does have to be protected.
سؤال
Describe the RIPEMD hash.
سؤال
Explain hashing.
سؤال
How can steganography be used to hide information in something other than images?
سؤال
Describe how Message Digest2 (MD2) works.
سؤال
Describe hard disk drive encryption.
سؤال
Discuss how cryptography can help ensure the availability of the data.
سؤال
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
Data that has been encrypted.​
سؤال
List and describe the characteristics a hashing algorithm must have to be considered secure.
سؤال
Discuss how HMAC works.
سؤال
Describe how a block cipher works.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Basic Cryptography
1
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

A)Substitution
B)Block
C)Loop
D)Sponge
D
2
A Hardware Security Module (HSM) is essentially a chip on the motherboard of the computer that provides cryptographic services.
False
3
The asymmetric cryptography algorithm most commonly used is:

A)AES
B)RSA
C)Twofish
D)Blowfish
B
4
A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
5
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

A)RSA
B)SHA1
C)MD5
D)MD2
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
6
A block cipher works on a single character at a time, and is faster than a stream cipher.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
7
What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?

A)GPG
B)OGP
C)CGP
D)GPP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
8
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

A)AES
B)Twofish
C)3DES
D)RSA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
9
Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?

A)Reactive cryptography
B)Symmetric cryptography
C)Analog cryptography
D)Quantum cryptography
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
10
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

A)Confidentiality
B)Availability
C)Encryption
D)Integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following is not one of the functions of a digital signature?

A)Verification of the sender
B)Prevention of the sender from disowning the message
C)Prove the integrity of the message
D)Protect the public key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
12
Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
13
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?

A)RSA
B)AES
C)Blowfish
D)3DES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
14
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
15
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

A)shift
B)substitution
C)lock
D)loop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
16
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

A)FCC
B)RSA
C)ECC
D)IKE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
17
Data that is in an unencrypted form is referred to as which of the following?

A)Plaintext
B)Plain text
C)Simpletext
D)Cleartext
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
18
What type of cryptography uses two keys instead of just one, generating both a private and a public key?

A)Symmetric
B)Asymmetric
C)Shared
D)Open
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
19
What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?

A)Twofish
B)Blowfish
C)Whirlpool
D)Rijndal
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
20
If using the MD5 hashing algorithm, what is the length to which each message is padded?

A)32 bits
B)64 bits
C)128 bits
D)512 bits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
21
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
​Match the following terms to the appropriate definitions.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
22
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
23
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An algorithm that takes one character and replaces it with one character.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
24
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A temporary key that is used only once before it is discarded.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
25
A key that is generated by a symmetric cryptographic algorithm is said to be a:

A)private key
B)public key
C)symmetric key
D)shared key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
26
What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data?

A)hash
B)key
C)digest
D)block
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
27
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A cipher that manipulates an entire block of plaintext at one time.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
28
On what principle did Julius Caesar's cryptographic messages function?

A)Each alphabetic letter was replaced by a corresponding number
B)Each alphabetic letter was represented by a seemingly random symbol
C)Each alphabetic letter was shifted three places down in the alphabet
D)Each alphabetic letter was shifted 5 places up in the alphabet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
29
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
30
The SHA-1 hashing algorithm creates a digest that is how many bits in length?

A)​96 bits
B)​128 bits
C)​160 bits
D)​192 bits
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
31
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
32
Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:

A)AES
B)3DES
C)RSA
D)Twofish
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
33
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
34
The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

A)matrix-based
B)lattice-based
C)linear
D)quantum
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
35
A ________________ involves combining plaintext with a random key to create ciphertext that cannot be broken mathematically.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
36
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An algorithm that uses elliptic curves instead of prime numbers to compute keys
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
37
The Data Encryption Standard is a(n) ______________ cipher.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
38
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
39
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An asymmetric encryption key that does not have to be protected.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
40
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An asymmetric encryption key that does have to be protected.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
41
Describe the RIPEMD hash.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
42
Explain hashing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
43
How can steganography be used to hide information in something other than images?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
44
Describe how Message Digest2 (MD2) works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
45
Describe hard disk drive encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
46
Discuss how cryptography can help ensure the availability of the data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
47
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
Data that has been encrypted.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
48
List and describe the characteristics a hashing algorithm must have to be considered secure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
49
Discuss how HMAC works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
50
Describe how a block cipher works.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 50 في هذه المجموعة.