IT 481 Chapter 8

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The CA periodically distributes a(n) ____ to all users that identifies all revoked certificates.

CRL

____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.

Correlation

Digital signatures should be created using processes and products that are based on the ____.

DSS

____ are encrypted messages that can be mathematically proven to be authentic.

Digital signatures

____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.

Encryption

To perform the Caesar cipher encryption operation, pad values are added to numeric values that represent the plaintext that needs to be encrypted.

False

____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.

Hash

A ____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.

Key

The ____ is essentially a one-way hash value that is encrypted with a symmetric key.

MAC

____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.

PGP

____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.

PKI

The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.

RSA

The ____ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.

SSL Record Protocol

Bit stream methods most commonly use functions like the exclusive OR operation (_____).

XOR

An X.509 v3 certificate binds a _____, which uniquely identifies a certificate entity, to a user's public key.

distinguished name

DES uses a(n) _____-bit block size.

64

Substitution ciphers that use two or more alphabets, are referred to as ____ substitutions.

polyalphabetic

A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.

symmetric


Ensembles d'études connexes

Chapter 8: Insurance Regulation Quiz

View Set

Science Quiz 2: Types of Cell Division

View Set

Communications test 2 quizzes 5-8

View Set

social psychology week 10 chapter 9

View Set

中文 第三级 第五课 我是谁(语句)

View Set

MGT101 (1,2,3,4,6,7,8,10,11,14,15)

View Set

Intermediate Macroeconomics Ch 8-9 Learning Curve

View Set

Kinesology chapter 5 motor behavior

View Set