11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Hash values Private keys Public keys : Cryptographic algorithm

Private keys

Chosen plain text Known plain text Brute force Chosen ciphertext

Known plain text

Rubber hose attack Brute force attack Trickery attack

Rubber hose attack

Bob encrypts a message using a key and sends it to Alice. Alice decrypts the message using the same key. Which of the following types of encryption keys is being used?

Symmetric

plain text ciphertext steganography encryption algorithm

ciphertext

They are platform-independent. They can be performed in a distributed parallel processing environment. They are fast. They test every possible valid combination.

They test every possible valid combination.

Does not work well for bulk encryption of less sensitive data. Uses only one key to encrypt and decrypt data. Uses only one algorithm type. Does not require the exchange of the shared secret key.

Uses only one key to encrypt and decrypt data.


Ensembles d'études connexes

Texas Life & Health Insurance (Quiz)

View Set

ATI Fundamentals Infection Control and Isolation

View Set

Ch 2 A Closer Look: Differences Among the Nutrition Standards and Guidelines and When to Use Them - Attempt 2

View Set

The Printing Press was a revolutionary invention. To what extent is this statement true?

View Set

Investments Concepts in Review Ch. 1-5

View Set

Mickey, Millie and Mut (Project 1 4th ed Unit 2C SB p20)

View Set