IT 481 Chapter 8
The CA periodically distributes a(n) ____ to all users that identifies all revoked certificates.
CRL
____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.
Correlation
Digital signatures should be created using processes and products that are based on the ____.
DSS
____ are encrypted messages that can be mathematically proven to be authentic.
Digital signatures
____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
Encryption
To perform the Caesar cipher encryption operation, pad values are added to numeric values that represent the plaintext that needs to be encrypted.
False
____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
Hash
A ____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.
Key
The ____ is essentially a one-way hash value that is encrypted with a symmetric key.
MAC
____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.
PGP
____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.
PKI
The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.
RSA
The ____ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.
SSL Record Protocol
Bit stream methods most commonly use functions like the exclusive OR operation (_____).
XOR
An X.509 v3 certificate binds a _____, which uniquely identifies a certificate entity, to a user's public key.
distinguished name
DES uses a(n) _____-bit block size.
64
Substitution ciphers that use two or more alphabets, are referred to as ____ substitutions.
polyalphabetic
A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.
symmetric