Chapter 8 - Cryptography

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The ______ algorithm, developed in 1977, was the first public key encryption algorithm published for commercial use.

RSA

The ___________ is responsible for the fragmentation, compression, encryption, and attachment of an SSL, header to the cleartext prior to transmission.

SSL Record Protocol

______________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are known.

Work factor

Bit stream methods commonly use algorithm functions like the exclusive OR operation (_________).

XOR

A X 509 v3 certificate binds a ___________, which uniquely identifies a certificate entity, to a user's public key.

distinguished name

More advanced substitution ciphers use two or more alphabets, and are referred to as _____________ substitutions.

polyalphabetic

Using a database of precomputed hashes from sequentially calculated passwords called a(n) _________________, an attacker can simply look up a hashed password and read out the text version.

rainbow table

A method of encryption that requires the same secret key to encipher and decipher the message is known as ___________ encryption.

symmetric

One encryption method made popular by spy movies involves using the text in a book as the key to decrypt a message. T/F

True

Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms. T/F

True

Secure Multipurpose Internet Mail Extensions builds on the encoding format of the MIME protocol and uses digital signatures based on public key cryptosystems to secure e-mail. T/F

True

The Digital Signature Standard established by NIST is used for electronic document authentication by federal information systems. It is based on a variant of the EIGamal algorithm. T/F

True

The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verifications. T/F

True

The most popular modern version of steganography involves hiding information within files that contain digital pictures or other images. T/F

True

The premutation cipher simply rearranges the values within a block to create the ciphertext. T/F

True

When an asymmetric cryptographic process uses the sender's private key to encrypt a message, the sender's public key must be used to decrypt the message. T/F

True

Within a PKI, a(n) registration authority issues, manages, authenticates, signs, and revokes users' digital certificates, which typically contain the user name, public key, and other identifying information. T/F

False

You cannot combine the XOR operation with a block cipher operation. T/F

False

transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet. T/F

False

_________ is a protocol that can be used to secure communications across any IP-based network such as LANs, WANs, and the Internet.

IPSec

_________ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.

Key

In 1917, Gilbert S. Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key. T/F

True

Internet Protocol Security (IPSec) is an open-source protocol framework for security development within the TCP/IP family of protocol. T/F

True

Internet Protocol Security is designed to protect data integrity, user confidentiality, and authenticity at the IP packet level. T/F

True

At the World Championships in Athletics in Helsinki in August of 2005, a virus called Cabir infected dozens of ________, the first time this occurred in a public setting.

Bluetooth mobile phones

SSL builds on the encoding format of the Multipurpose Internet Mail Extensions protocol and uses digital signatures based on public key cryptosystems to secure e-mail. T/F

False

Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network decrypts the message sent to it and then reencrypts it using different keys and sends it to the next neighbor, and this process continues until the message reaches the final destination. T/F A) True B) False

False

The AES algorithm was the first public key encryption algorithm to use a 256 bit key length. T/F

False

The S-HTTP security solution provides six services, authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management. T/F

False

The application header (AH) protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification. T/F

False

The asymmetric encryption systems use a single key to both encrypt and decrypt a message. T/F

False

To encipher means to decrypt, decode, or convert ciphertext into the equivalent plaintext. T/F

False

To perform the Caesar cipher encryption operation, the pad values are added to numeric values that represent the plaintext that needs to be encrypted. T/F

False

Usually, as the length of a crytpovariable increases, the number of random guesses that have to be made in order to break the code is reduced. T/F

False

SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm.

160

DES uses a(n) _______________-bit block size.

64

Digital signatures should be created using processes and products that are based on the __________.

DSS

_____________ is the process of converting an original message into a form that is unreadable to unauthorized individuals.

Encryption

3DES was created to offer the same strength as the DES algorithm but ran three times as fast, thus saving time. T/F

False

A multipart authentication code (MAC) is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest. T/F

False

As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES. T/F

False

Diffe-Hellman key exchange uses asymmetric encryption to exchange session keys. T/F

False

Encryption is the process of converting the cyphertext message back into plaintext so that it can be readily understood. T/F

False

Encryption methodologies that require the same secret key to encipher and decipher the message are using what is called public-key encryption. T/F

False

Hashing functions require the use of keys. T/F

False

In a book cipher, the key consists of a list of codes representing the page number, line number, and word number of the plaintext word. T/F

False

________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage application.

PGP

_____________ was developed by Phil Zimmermann and uses the IDEA Cipher for message encoding.

PGP

____________ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enable users to communicate securely.

PKI

A(n) distinguished name uniquely identifies a certificate entity to a user's public key. T/F

True


Ensembles d'études connexes

Portage Learning A&P II: Final Exam

View Set

Chemistry: Ionic and Metallic Bonding

View Set

Why Are These True? Science Is Or Isn't Study Guide

View Set

Economics-Mod. 7 WS2: Money, Monetary Policy

View Set