CIT370 Ch 5
Diffie-Hellman (DH)
Which of the following key exchanges uses the same keys each time?
Hardware Security Module (HSM)
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?
a. risk loss
Which of these is NOT a basic security protection for information that cryptography can provide? a. risk loss b. integrity c. confidentiality d. authenticity
Collisions should be rare.
Which of these is NOT a characteristic of a secure hash algorithm?
Collisions should be rare.
Which of these is NOT a characteristic of a secure hash algorithm? Collisions should be rare. The results of a hash function should not be reversed. The hash should always be the same fixed size. A message cannot be produced from a predefined hash.
Advanced Encryption Standard
Which of these is the strongest symmetric cryptography algorithm?
integrity
Which protection is provided by hashing?
encrypts the key and the message
The Hashed Message Authentication Code (HMAC) __________.
provides cryptographic services in hardware instead of software
The Trusted Platform Module (TPM) _________.
b. in the directory structure of the file system
The areas of a file in which steganography can hide data include all of the following EXCEPT . a. in data that is used to describe the content or structure of the actual data b. in the directory structure of the file system c. in the file header fields that describe the file d. in areas that contain the content data itself
A block cipher encrypts plaintext at a fixed size whereas a sponge function takes an input string at any length
What are the differences between a block cipher and a sponge function?
A block cipher encrypts plaintext at a fixed size whereas a sponge function takes an input string at any length
What are the differences between a block cipher and a sponge function? A block cipher encrypts plaintext at a fixed size whereas a sponge function takes an input string at any length A block cipher is considered strictly an asymmetric cryptographic algorithm A sponge function requires much less processing power than a block cipher A block cipher inputs random additional characters into the data before encryption
plaintext
What is data called that is to be encrypted by inputting it into an cryptographic algorithm?
SHA-3
What is the latest version of the Secure Hash Algorithm?
32-bit systems
What type of system is blowfish designed to run efficiently on?
RSA
Which asymmetric cryptography algorithm is the most secure?
RSA
Which asymmetric encryption algorithm uses prime numbers?
The USB device can encrypt the hard drive of an attacker when they attempt to access data
Which of the following is NOT a benefit of USB device encryption?
It is a compact algorithm that could be considered ideal for smaller devices and appliances
Which of the following is an advantage of the Keccak algorithm?
Data in an unencrypted form
"Plaintext" is a term that is best described as what? Data in an unencrypted form An algorithm Text that has no formatting applied Data that has been encrypted
b. verify the receiver
A digital signature can provide each of the following benefits EXCEPT . a. prove the integrity of the message b. verify the receiver c. verify the sender d. enforce nonrepudiation
Redundancy
A digital signature does NOT provide which of the following? Integrity Nonrepudiation Redundancy Availability
digest
A(n) _____ is not decrypted but is only used for comparison purposes.
OTP
All of the following can be broken mathematically EXCEPT _____.
Hash algorithm
An encrypted digest is produced from what?
in-band key exchange
Elliptic Curve Diffie-Hellman (ECDH) is an example of _____.
Alice's public key
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Lattice-based
NTRUEncrypt is based on which cryptography method? Quantum-based Prim number based Lattice-based Elliptic curve cryptography
Resistance groups and operation teams during World War II
OTPs were originally used by whom? Security guards Resistance groups and operation teams during World War II Operating system developers Video game developers
non-repudation
Proving that a user sent an email message is known as .
perfect forward secrecy
Public key systems that generate random public keys that are different for each session are called _______.