MIS Security: Chapter 9
_________ is the act of unscrambling ciphertext into plaintext - decryption - salt value - hash - algorithm
Decryption
decryption is the act of unscrambling ciphertext into plaintex. True or false.
True
a salt value is a set of random characters that you can combine with an actual input key to create the encryption key. True or false.
True.
encryption is the act of scrambling plaintext into ciphertext. true or false.
Truth
what term is used to describe a type of crytography that uses a cipher with two separate keys, one for encryption and one for decryption, so that correspondents do not first have to exchange secret information to communicate securely? - hash - key distribution - symmetric key cryptography - asymmetric key cryptography
asymmetric (public) key cryptography
in a ____________, the cryptanalyst can encrypt any information and observe the output. This is the best for the cryptanalyst. - chosen-plaintext attack - chosen-ciphertext attack - ciphertext-only attack - known-plaintext attack
chosen plain text attack
in a __________________ cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system - ciphertext-only attack (COA) - chosen-plaintext attack - known-plaintext attack (KPA) - chosen-ciphertext attack
chosen-ciphertext attack
which of the following is the definition of Vigenerecipher? - an encryption cipher that is a product cipher with a 56-bit key consisting of 16 iterations of substitution and transformation - encryption cipher that uses multiple encryption schemes in succession - encryption cipher that replaces bits, characters, or blocks of information with other bits, characters, or blocks - encryption cipher that shifts each letter in the english alphabet a fixed number of positions, with Z wrapping back to A.
encryption cipher that uses multiple encryption schemes in succession
in a chosen-plaintext attack, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system. True or false.
false - its a chosen - ciphertext attack
a __________ is an encryption key used to encrypt other keys before transmitting them. - key distribution - private (symmetric) key - key directory - key-encrypting key
key-encrypting key
what name is given to an encryption cipher that uniquely maps any letter to any other letter? - simple substitution cipher - product cipher - standard cipher - transposition cipher
simple substitution cipher
Certain security objectives add value to information systems. ____________ provides an exact time when a producer creates or sends information - ownership - timestamping - revocation - message authentication
timestamping
a crypto accelerator offloads cryptographic routines from the main processor to cards that have chipsets designed for fast encryption. true or false
true
an asymmetric key distribution system has no need for couriers, back channels, or expensive storage or inventory plans. True or False?
true
in a _______ cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be. - known-plaintext attack - ciphertext-only attack - chosen-ciphertext attack - chosen-plaintext attack
ciphertext only attack
in a known-plaintext attack, the cryptanalyst has access only to a segment of encrypted data, and has no choice as to what that data might be. True or false.
false - this is ciphertext-only attack
a ________ is one of the simplest substitution ciphers. It shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A. - vigernere cipher - product cipher - transposition cipher - caesar cipher
Caesar cipher
what is meant by key distribution? - a trusted entity that stores and distributes verified digital certificates - an encryption cipher that uses the same key to encrypt and decrypt information - a trusted repository of all public keys - the process of issuing keys to valid users of a cryptosystem so they can communicate
the process of issuing keys to valid users of a cryptosystem so they can communicate
what is meant by key distribution? - trusted repository of all public keys - trusted entity that stores and distributes verified digital certificates. - encryption cipher that uses the same key, to encrypt and decrypt information - the process of issuing keys to valid users of a cryptosystem so they can communicate
the process of issuing keys to valid users of a cryptosystem so they can communicate