Quiz #8

¡Supera tus tareas y exámenes ahora con Quizwiz!

_______________ is a symmetric algorithm that organizations currently use. It is a 64-bit block cipher that has a variable key length from 32 to 448 bits. It is much faster than DES or IDEA. Its author, Bruce Schneier, placed it in the public domain.

Blowfish

________ is one of the simplest substitution ciphers. It shifts each letter in the English alphabet a fixed number of positions, with Z wrapping back to A.

Caesar cipher

In a ________, cryptanalysts submit data coded with the same cipher and key they are trying to break to the decryption device to see either the plaintext output or the effect the decrypted message has on some system.

Chosen-ciphertext attack

The term "differential cryptanalysis" refers to the act of unscrambling ciphertext into plaintext.

False

_______________ enables you to prevent a party from denying a previous statement or action.

Nonrepudiation

What name is given to random characters that you can combine with an actual input key to create the encryption key?

Salt Value

A crypto accelerator offloads cryptographic routines from the main processor to cards that have chipsets designed for fast encryption.

True

An algorithm to encrypt or decrypt information is the definition of cipher.

True

The goal of cryptography is to make the cost or the time required to decrypt a message without the key exceed the value of the protected information.

True

A ________ is a one-way calculation of information that yields a result usually much smaller than the original message.

checksum


Conjuntos de estudio relacionados

Chapter 3- Void and Voidable Marriages Overview

View Set

Design of information structures

View Set