chapter 9

¡Supera tus tareas y exámenes ahora con Quizwiz!

Digital signatures require asymmetric key cryptography.

TRUE

A digitized signature is a combination of a strong hash of a message and a secret key.

FALSE

A private key cipher is also called an asymmetric key cipher.

FALSE

Product cipher is an encryption algorithm that has no corresponding decryption algorithm.

FALSE

The term certificate authority (CA) refers to a trusted repository of all public keys.

FALSE

You must always use the same algorithm to encrypt information and decrypt the same information.

FALSE

A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.

TRUE

A salt value is a set of random characters you can combine with an actual input key to create the encryption key.

TRUE

A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks.

TRUE

Integrity-checking tools use cryptographic methods to make sure nothing and no one has modified the software.

TRUE

Message authentication confirms the identity of the person who started a correspondence.

TRUE

The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).

TRUE

The financial industry created the ANSI X9.17 standard to define key management procedures.

TRUE

The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest.

TRUE


Conjuntos de estudio relacionados

Exam 2 Ch. 31 Physical Assessment Practice Questions

View Set

CIS66 Networking Fundamentals Ch 2

View Set

Chapter 25 - Alterations of the Female Reproductive System EVOLVE

View Set

Chapter 40: Introduction to the Endocrine System

View Set

NSG 325 Final Practice Questions

View Set

Combo with "Microeconomics Potter Chapter 11 Grade-It-Now" and 2 others

View Set