CIS Chapter 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

XOR

Bit stream methods commonly use algorithm functions like the exclusive OR operation.

DDS

Digital signatures should be created using processes and products that are based on the

160

SHA-1 produces a(n) ____-bit message digest, which can then be used as an input to a digital signature algorithm

SSL Record Protocol

The ____ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.

RSA

The___ algorithm developed in 1977 was the first public key encryption algorithm published for commercial use.

AH

The___ protocol provides system-to-system authentication and data integrity verification but does not provide secrecy for the content of a network communication.

AES

___ is the current federal information processing standards that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense instrastructure.

Key

___ is the information used in conjunction with an algorithm to create the cipher text from the plaintext or derive the plaintext from the cipher text.

Hash

____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.

PGP

____ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.

Work Factor

____ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown.

Encryption

____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.

PGP

____ was developed by Phil Zimmermann and uses the IDEA Cipher for message encoding

PKI

_____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.

IPSec

is a protocol that can be used to secure communication across any IP-based network such as LANs, WANs, and the Internet.

symetric

A method of encryption that requires the same secret key to encipher and decipher the message is known as ___ encryption.

MAC

A___ is a key-dependent, one-way hash function that allows only specific recipients to access the message digest.

distinguish name

An X.509 v3 certificate binds a___ which uniquely identifies a certificate entity, to a user's public key.


Ensembles d'études connexes

Chapter 4 : Nucleic Acids and RNA - Homework Questions

View Set

Economics 2302 Chapter 11: Price Discrimination

View Set

SOPHIA Human Biology Unit 2 Challenge 2: Skeletal Muscles

View Set

Chapter 3 Inflammation and Tissue Repair

View Set

Ch.2 The Market System and the Circular Flow

View Set

Society The Basics: Gender Stratification

View Set