Adv. Computer Security Ch 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

XOR

Which binary mathematical operation can be used for a simple encryption method?

Caesar cipher

Which is a very early encryption method?

the underlying letter and word frequency can still be determined

Many encryption techniques such as XOR are easily broken because:

56bit

What size key does this system use?

brute force

Attempting to determine a password by simply trying every possible combination within the set parameters until successful is called:

PGP

Which encryption method is most widely available as an add-in for various applications, including email clients?

XOR ASCII with a key

Which is NOT a part of a step in the XOR operation of encryption method.

Transferring keys would be immune to interference with subatomic particles.

Which is NOT a way in which quantum physics might improve encryption in the future?

ASCII

Which is NOT an encryption method?

John the Ripper

Which is a powerful password cracker that works on Windows and Linux platforms?

RSA

Which is a public key encryption standard developed by three mathematicians in 1977 that provides very high but slow security?

Blowfish

Which is a symmetric block cipher developed in 1993 that provides variable-length key sizes ranging from 32 to 448 bits?

IDEA

Which is a very complicated block cipher using 128-bit keys to generate sub-keys to be applied to multiple blocks at the same time?

It uses two different keys.

Which is true about public key encryption?

DES

Which of the following is a symmetric key system using blocks?

Speed of the algorithm

If you are using a block cipher to encrypt large amounts of data, which of the following would be the most important consideration when deciding which cipher to use (assuming all of your possible choices are well known and secure):

NOT

Operations not found in normal math that can be performed on binary numbers include all of the following EXCEPT:

It is relatively fast

What is the primary advantage of the encryption algorithm described as a symmetric key system using blocks?

To validate the sender of a digital signature or software

What is the purpose of a certificate?

Public key

What type of encryption uses a different key to encrypt the message than it uses to decrypt the message?

ADEA

Which encryption algorithm uses a variable length symmetric key?

Testing the encryption of your own network

Which of the following is the most common legitimate use for a password cracker?

Caesar cipher

Which of the following is the oldest known encryption method?

It does not disrupt letter frequency.

Which of the following is the primary weakness in the Caesar cipher?

IDEA

Which of the following uses a total of 52 16-bit sub-keys?

Computer and Internet communications

Which type of encrypted communication is most common?

A private certificate authority

Who issues certificates?

No matter how secure your network is, the data being transmitted is still vulnerable without encryption.

Why is encryption an important part of security?

It does not change letter or word frequency

Why is the binary mathematical operation that is used for simple encryption not secure?

Multi-alphabet substitution

An improvement on the Caesar cipher that uses more than one shift is called a what?


Conjuntos de estudio relacionados

Managing Exterior Networks and Collaborations

View Set

Management 5, 6,8/ Marketing 6,7,8

View Set

Chapter 3 Fundamentals of Programming - Java

View Set