Module 9˸ Cryptography

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which encryption algorithm uses a method called block cipher and a variable key length from 32 to 448 bits?

Blowfish

Which type of cryptography attack is being performed when the cryptanalyst can choose different ciphertexts to be decrypted and has access to the decrypted plaintext?

Chosen-ciphertext attack

In an RSA attack using brute-force, which factoring algorithm if the fastest for numbers greater than 110?

General number field sieve

Which encryption-cracking tool displays a polite screensaver during the cracking process of the cipher and is designed to operate using idle machine time?

Idle CPU Time

Which message-digest algorithm does the program Pretty Good Privacy (PGP) use for computing message digests?

MD5

Which type of RSA attack is used in situations where a number of users share the n but they have a different e and d?

Modulus Attacks

Which encryption algorithm accepts a message of 264 bits in length and produces a 160-bit message-output digest?

SHA-1

What protocol is used to provide a secure authentication mechanism between two communicating applications, such as a client and a server?

SSL

What type of encryption method uses a key pair, one public key available to anyone, and one private key held only by the key owner?

asymmetric key system

When using a digital signature, what is the process called that is used to create a fingerprint of a message?

hash function


Ensembles d'études connexes

Chapter 3 Microscopy and Cell Structure

View Set

Supervisory Management OTC Study Guide

View Set

The Bits and Bytes of Computer Networking - Week 3

View Set

Health Assessment-Chapter 25 + 27-Male + Female Genitourinary System

View Set

Personal Insight for Leaders - Followership

View Set

Social Psychology Final Exam Chapters 12

View Set

chemistry chapter 3 (important chemical reactions) PART 1 : RUSTING

View Set

Financial Accounting Test 1 Chapters 1-3

View Set