Basic Cryptography - Chapter 11
RC4
An RC stream cipher that will accept keys up to 128 bits in length.
Stream Cipher
An algorithm that takes one character and replaces it with one character.
Elliptic Curve Cryptography (ECC)
An algorithm that uses elliptic curves instead of prime numbers to compute keys.
RSA
An asymmetric algorithm published in 1977 and patented by MIT in 1983.
Quantum Cryptography
An asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys.
Private Key
An asymmetric encryption key that does have to be protected.
Public Key
An asymmetric encryption key that does not have to be protected.
Digital Signature
An electronic verification of the sender.
NTLMv2 (New Technology LAN Manager Version 2) Hash
An updated version of NTLM that uses HMAC with MD5.
B. encrypting and decrypting e-mail attachments
Hashing would not be used in which of the following examples? A. bank automatic teller machine (ATM) B. encrypting and decrypting e-mail attachments C. verifying a user password entered on a Linux system D. determining the integrity of a message
Steganography
Hiding the existence of data within a text, audio, image, or video file.
B. Alice's public key
If Bob want to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is __________. A. Alice's private key B. Alice's public key C. Bob's public key D. Bob's private key
Nonrepudiation
The process of proving that a user performed an action.
Cryptography
The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it.
Hash
The unique digital fingerprint created by a hashing algorithm.
Cleartext
Unencrypted data.
One-Time Pad (OTP)
Using a unique truly random key to create ciphertext.
A. Plaintext
What is data called that is to be encrypted by inputting into an encryption algorithm? A. Plaintext B. Cleartext C. Opentext D. Ciphertext
B. RSA
Which of the following asymmetric cryptographic algorithms is the most secure? A. MEC-2 B. RSA C. MD-17 D. SHA-2
D. RSA
Which of the following asymmetric encryption algorithms uses prime numbers? A. EFS B. Quantum computing C. ECC D. RSA
D. Hardware Security Module (HSM)
Which of the following has an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? A. Trusted Platform Module (TPM) B. Self-encrypting hard disk drives (HDDs) C. Encrypted hardware-based USB devices D. Hardware Security Module (HSM)
C. Integrity
Which of the following is a protection provided by hashing? A. Authenticity B. Confidentiality C. Integrity D. Availability
B. Stop loss
Which of the following is not a basic security protection over information that cryptography can provide? A. confidentiality B. Stop loss C. Integrity D. Authenticity
A. Advanced Encryption Standard
Which of the following is the strongest symmetric cryptographic algorithm? A. Advanced Encryption Standard B. Data Encryption Standard C. Triple Data Encryption Standard D. Rivest Cipher (RC) 1
D. RIPEMD
__________ is a hash that uses two different and independent parallel chains of computation, the results of which are then combined at the end of the process. A. DES B. AES C. RC4 D. RIPEMD
A. NTRUEncrypt
__________ uses lattice-based cryptography and may be more resistant to quantum computing attacks. A. NTRUEncrypt B. ECC C. RC4 D. SHA-512
D. Hashed Message Authentication Code (HMAC)
___________ encrypts a hash with a shared secret key. A. Key_hash B. WEP C. MDRIPE D. Hashed Message Authentication Code (HMAC)
Blowfish
A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.
Trusted Platform Module (TPM)
A chip on the motherboard of the computer that provides cryptographic services.
Block Cipher
A cipher that manipulates an entire block of plaintext at one time.
Pretty Good Privacy (PGP)
A commercial product that is commonly used to encrypt e-mail messages.
Message Digest (MD)
A common hash algorithm of several different versions.
B. verify the receiver
A digital signature can provide each of the following benefits except __________. A. prove the integrity of the message B. verify the receiver C. verify the sender D. enforce nonrepudiation
Rivest Cipher (RC)
A family of cipher algorithms designed by Ron Rivest.
RACE Integrity Primitives Evaluation Message Digest (RIPEMD)
A hash algorithm that uses two different and independent parallel chains of computation and then combines the result at the end of the process.
Twofish
A later derivation of the Blowfish algorithm that is considered to be strong.
Key
A mathematical value entered into the algorithm to produce ciphertext.
NTLM (New Technology LAN Manager) Hash
A password hash for Microsoft Windows systems that is no longer recommended for use.
Message Digest 5 (MD5)
A revision of MD4 that is designed to address it weaknesses.
Hardware Security Module (HSM)
A secure cryptographic processor.
Secure Hash Algorithm (SHA)
A secure hash algorithm that creates hash values of longer lengths than Message Digest (MD) algorithms.
Data Encryption Standard (DES)
A symmetric block cipher that uses 56-bit key and encrypts data in 64-bit blocks.
Advanced Encryption Standard (AES)
A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.
Triple Data Encryption Standard (3DES)
A symmetric cipher that was designed to replace DES.
Hashed Message Authentication Code (HMAC)
A variation of a hash that encrypts the hash with a shared secret key before transmitting it.
B. hash
A(n) __________ is not decrypted, but is only used for comparison purposes. A. stream B. hash C. algorithm D. key
Private Key Cryptography
Cryptographic algorithms that use a single key to encrypt and decrypt a message.
Whole Disk Encryption
Cryptography that can be applied to entire disks.
Plaintext
Data input into an encryption algorithm.
Ciphertext
Data that has been encrypted.
A. collisions should be rare
Each of the following is a characteristic of a secure hash algorithm except ____________. A. collisions should be rare B. the results of a hash function should not be reversed C. the hash should always be the same fixed size D. a message cannot be produced from a predefined has
Symmetric Cryptographic Algorithm
Encryption that uses a single key to encrypt and decrypt a message.
Asymmetric Cryptographic Algorithm
Encryption that uses two mathematically related keys.
Public Key Cryptography
Encryption that uses two mathematically related keys.
GNU Privacy Guard (GPG)
Free and open-source software that is commonly used to encrypt and decrypt e-mail messages.
Algorithm
Procedures based on a mathematical formula; used to encrypt data.
C. nonrepudiation
Proving that a user sent an e-mail message is known as ______. A. repudiation B. integrity C. nonrepudiation D. availability
A. private key cryptography
Symmetric cryptographic algorithms are also called _________. A. private key cryptography B. cipherkey cryptography C. public/private key cryptography D. public key cryptography
A. is weaker than NTLMv2
The Microsoft Windows LAN Manager hash ___________. A. is weaker than NTLMv2 B. is part of BitLocker C. is required to be present when using TPM D. is identical to MD-4
D. provides cryptographic services in hardware instead of software
The Trusted Platform Module (TPM) __________. A. allows the user to boot a corrupted disk and repair it B. is only available on Windows computers running BitLocker C. includes a pseudorandom number generator (PRNG) D. provides cryptographic services in hardware instead of software
B. in the directory structure of the file system
The areas of a file in which steganography can hide include all of the following except __________. A. in data that is used to describe the content or structure of the actual data B. in the directory structure of the file system C. in the file header fields that describe the file D. in areas that contain the content data itself
Hashing
The process for creating a unique digital fingerprint signature for a set of data.
Decryption
The process of changing ciphertext into plaintext.
Encryption
The process of changing plaintext to ciphertext.