Computer Security Midterm CH4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

brute-force attack

A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

pseudorandom

A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.

T

An important element in many computer security services and applications is the use of cryptographic algorithms. True or False

keystream

Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator.

public-key

Digital signatures and key management are the two most important applications of __________ encryption.

Electronic Frontier Foundation (EFF)

July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.

F

Like the MAC, a hash function also takes a secret key as input. True or False

F

Public-key algorithms are based on simple operations on bit patterns. True or False

T

Public-key cryptography is asymmetric. True or False

T

Some form of protocol is needed for public-key distribution. True or False

public and private key

The __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.

F

The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages. True or False

Diffie-Hellman Key Agreement

The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

electronic codebook (ECB)

The simplest approach to multiple block encryption is known as __________ mode, in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.

T

The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm. True or False

data at rest

Transmitted data stored locally are referred to as __________ .

RSA

__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.

library-based tape encryption

__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.

back-end appliance

A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.

strong hash function

A _________ protects against an attack in which one party generates a message for another party to sign.

digital signature

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.


Kaugnay na mga set ng pag-aaral

the ce shop - finance part 2 final

View Set

Ch 15: Care of Newborn & InfantPatty calls the hospital nursing hotline and asks, "My 8-week-old daughter cries 8 hours a day, and she is hard to console, is that normal?" What should the nurse's response be to this mother? A. "Let me ask you some more qu

View Set

JAVA ALL QUESTIONS SET 2, Chapter 10 - Queues, Deques, and Priority Queues, Final Exam, samm

View Set

History of Graphic Design - Test I

View Set

Chemical & Physical Methods of Microbial Control [Disinfectants, Antiseptics, etc.]

View Set