CS6035_ch20_ch21

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The type of operations used for transforming plaintext to ciphertext The number of keys used The way in which the plaintext is processed

Cryptographic systems are generically classified by _______.

AES uses a Feistel structure.

False - DES pg 641

Timing attacks are only applicable to RSA.

False - pg 683

Just like RSA can be used for signature as well as encryption, Digital Signature Standard can also be used for encryption.

False - pg 688

ECC - pg 685

The principal attraction of ________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead.

The ciphertext-only attack is the easiest to defend against.

True - 639

Using PKCS (public-key cryptography standard), when RSA encrypts the same message twice, different ciphertexts will be produced.

True - lecture stack overflow

In general, public key based encryption is much slower than symmetric key based encryption.

True - lectures stack exchange

Symmetric encryption is also referred to as secret-key or single-key encryption.

True - pg 638

A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.

True - pg 641

Each block of 64 plaintext bits is encoded independently using the same key? is a description of the CBC mode of operation.

True - pg 656 and lecture

The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithms.

True - pg 685

A key exchange protocol is vulnerable to a man-in-the-middle attack if it does not authenticate the participants.

True - pg 688

None of the above

Which of the following feature can only be provided by public-key cryptography?

ECB - pg 655

Which of the following would allow an attack that to know the (plaintext of) current message must be the same as one previously transmitted because their ciphtertexts are the same?

Timing attacks - pg 683

________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

Mathematical - pg 681

________ attacks have several approaches, all equivalent in effort to factoring the product of two primes.

Key distribution technique - pg 662

________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.

Diffie-Hellman - pg 684

_________ was the first published public-key algorithm.

Plaintext - pg 42

is the original message or data that is fed into the encryption process as input.


Ensembles d'études connexes

Ch. 6 energy and oscillations, Exam 2

View Set

Christianity and the Fall of Rome.

View Set

Test One Quizzes - Professional Selling

View Set

Chapter 33: Skin Integrity and Wound Care

View Set

Chapter 13 - Group Health Insurance

View Set