Basic Cryptography - Chapter 11

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

RC4

An RC stream cipher that will accept keys up to 128 bits in length.

Stream Cipher

An algorithm that takes one character and replaces it with one character.

Elliptic Curve Cryptography (ECC)

An algorithm that uses elliptic curves instead of prime numbers to compute keys.

RSA

An asymmetric algorithm published in 1977 and patented by MIT in 1983.

Quantum Cryptography

An asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys.

Private Key

An asymmetric encryption key that does have to be protected.

Public Key

An asymmetric encryption key that does not have to be protected.

Digital Signature

An electronic verification of the sender.

NTLMv2 (New Technology LAN Manager Version 2) Hash

An updated version of NTLM that uses HMAC with MD5.

B. encrypting and decrypting e-mail attachments

Hashing would not be used in which of the following examples? A. bank automatic teller machine (ATM) B. encrypting and decrypting e-mail attachments C. verifying a user password entered on a Linux system D. determining the integrity of a message

Steganography

Hiding the existence of data within a text, audio, image, or video file.

B. Alice's public key

If Bob want to send a secure message to Alice using an asymmetric cryptographic algorithm, the key he uses to encrypt the message is __________. A. Alice's private key B. Alice's public key C. Bob's public key D. Bob's private key

Nonrepudiation

The process of proving that a user performed an action.

Cryptography

The science of transforming information into a secure form while it is being transmitted or stored so that unauthorized persons cannot access it.

Hash

The unique digital fingerprint created by a hashing algorithm.

Cleartext

Unencrypted data.

One-Time Pad (OTP)

Using a unique truly random key to create ciphertext.

A. Plaintext

What is data called that is to be encrypted by inputting into an encryption algorithm? A. Plaintext B. Cleartext C. Opentext D. Ciphertext

B. RSA

Which of the following asymmetric cryptographic algorithms is the most secure? A. MEC-2 B. RSA C. MD-17 D. SHA-2

D. RSA

Which of the following asymmetric encryption algorithms uses prime numbers? A. EFS B. Quantum computing C. ECC D. RSA

D. Hardware Security Module (HSM)

Which of the following has an onboard key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? A. Trusted Platform Module (TPM) B. Self-encrypting hard disk drives (HDDs) C. Encrypted hardware-based USB devices D. Hardware Security Module (HSM)

C. Integrity

Which of the following is a protection provided by hashing? A. Authenticity B. Confidentiality C. Integrity D. Availability

B. Stop loss

Which of the following is not a basic security protection over information that cryptography can provide? A. confidentiality B. Stop loss C. Integrity D. Authenticity

A. Advanced Encryption Standard

Which of the following is the strongest symmetric cryptographic algorithm? A. Advanced Encryption Standard B. Data Encryption Standard C. Triple Data Encryption Standard D. Rivest Cipher (RC) 1

D. RIPEMD

__________ is a hash that uses two different and independent parallel chains of computation, the results of which are then combined at the end of the process. A. DES B. AES C. RC4 D. RIPEMD

A. NTRUEncrypt

__________ uses lattice-based cryptography and may be more resistant to quantum computing attacks. A. NTRUEncrypt B. ECC C. RC4 D. SHA-512

D. Hashed Message Authentication Code (HMAC)

___________ encrypts a hash with a shared secret key. A. Key_hash B. WEP C. MDRIPE D. Hashed Message Authentication Code (HMAC)

Blowfish

A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.

Trusted Platform Module (TPM)

A chip on the motherboard of the computer that provides cryptographic services.

Block Cipher

A cipher that manipulates an entire block of plaintext at one time.

Pretty Good Privacy (PGP)

A commercial product that is commonly used to encrypt e-mail messages.

Message Digest (MD)

A common hash algorithm of several different versions.

B. verify the receiver

A digital signature can provide each of the following benefits except __________. A. prove the integrity of the message B. verify the receiver C. verify the sender D. enforce nonrepudiation

Rivest Cipher (RC)

A family of cipher algorithms designed by Ron Rivest.

RACE Integrity Primitives Evaluation Message Digest (RIPEMD)

A hash algorithm that uses two different and independent parallel chains of computation and then combines the result at the end of the process.

Twofish

A later derivation of the Blowfish algorithm that is considered to be strong.

Key

A mathematical value entered into the algorithm to produce ciphertext.

NTLM (New Technology LAN Manager) Hash

A password hash for Microsoft Windows systems that is no longer recommended for use.

Message Digest 5 (MD5)

A revision of MD4 that is designed to address it weaknesses.

Hardware Security Module (HSM)

A secure cryptographic processor.

Secure Hash Algorithm (SHA)

A secure hash algorithm that creates hash values of longer lengths than Message Digest (MD) algorithms.

Data Encryption Standard (DES)

A symmetric block cipher that uses 56-bit key and encrypts data in 64-bit blocks.

Advanced Encryption Standard (AES)

A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.

Triple Data Encryption Standard (3DES)

A symmetric cipher that was designed to replace DES.

Hashed Message Authentication Code (HMAC)

A variation of a hash that encrypts the hash with a shared secret key before transmitting it.

B. hash

A(n) __________ is not decrypted, but is only used for comparison purposes. A. stream B. hash C. algorithm D. key

Private Key Cryptography

Cryptographic algorithms that use a single key to encrypt and decrypt a message.

Whole Disk Encryption

Cryptography that can be applied to entire disks.

Plaintext

Data input into an encryption algorithm.

Ciphertext

Data that has been encrypted.

A. collisions should be rare

Each of the following is a characteristic of a secure hash algorithm except ____________. A. collisions should be rare B. the results of a hash function should not be reversed C. the hash should always be the same fixed size D. a message cannot be produced from a predefined has

Symmetric Cryptographic Algorithm

Encryption that uses a single key to encrypt and decrypt a message.

Asymmetric Cryptographic Algorithm

Encryption that uses two mathematically related keys.

Public Key Cryptography

Encryption that uses two mathematically related keys.

GNU Privacy Guard (GPG)

Free and open-source software that is commonly used to encrypt and decrypt e-mail messages.

Algorithm

Procedures based on a mathematical formula; used to encrypt data.

C. nonrepudiation

Proving that a user sent an e-mail message is known as ______. A. repudiation B. integrity C. nonrepudiation D. availability

A. private key cryptography

Symmetric cryptographic algorithms are also called _________. A. private key cryptography B. cipherkey cryptography C. public/private key cryptography D. public key cryptography

A. is weaker than NTLMv2

The Microsoft Windows LAN Manager hash ___________. A. is weaker than NTLMv2 B. is part of BitLocker C. is required to be present when using TPM D. is identical to MD-4

D. provides cryptographic services in hardware instead of software

The Trusted Platform Module (TPM) __________. A. allows the user to boot a corrupted disk and repair it B. is only available on Windows computers running BitLocker C. includes a pseudorandom number generator (PRNG) D. provides cryptographic services in hardware instead of software

B. in the directory structure of the file system

The areas of a file in which steganography can hide include all of the following except __________. A. in data that is used to describe the content or structure of the actual data B. in the directory structure of the file system C. in the file header fields that describe the file D. in areas that contain the content data itself

Hashing

The process for creating a unique digital fingerprint signature for a set of data.

Decryption

The process of changing ciphertext into plaintext.

Encryption

The process of changing plaintext to ciphertext.


संबंधित स्टडी सेट्स

Chapter 9: Material Requiremnets Planning

View Set

Comparative Religion: Judaism, Christianity, & Islam

View Set

Review Questions Chapter 10 - 16

View Set

Chapter 14 and 16 Financial Markets

View Set

Certified Advance Admin Reviewer 211- updated

View Set

Physiology WK 10.1 Chapter 19 Blood Flow My Lab & Mastering

View Set