ch11 basic cryptography

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Alice's public key

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

plaintext

What is data called that is to be encrypted by inputting into an encryption algorithm? A. Plaintext B. Cleartext C. Opentext D. Ciphertext

RSA

Which of the following asymmetric encryption algorithms uses prime numbers

Advanced Encryption Standard

Which of the following is the strongest symmetric cryptographic algorithm? A. Advanced Encryption Standard B. Data Encryption Standard C. Triple Data Encryption Standard D. Rivest Cipher (RC) 1

NTRUEncrypt

__________ uses lattice-based cryptography and may be more resistant to quantum computing attacks. A. NTRUEncrypt B. ECC C. RC4 D. SHA-512

Hashed Message Authentication Code (HMAC)

_______encrypts a hash with a shared secret key

RIPEMD

_______is a hash that uses two different and independent parallel chains of computation, the results of which are then combined at the end of the process.

RSA

which of the following asymmetric cryptographic algorithms is the most secure?

Hardware Security Module (HSM)

which of the following has an obtained key generator and key storage facility, accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

Integrity

which of the following is a protection provided by hashing?

Stop loss

which of the following is not a basic security protection over information that cryptography can provide

verify the receiver

A digital signature can provide each of the following benefits EXCEPT

A. collisions should be rare

Each of the following is a characteristic of a secure hash algorithm except ____________. A. collisions should be rare B. the results of a hash function should not be reversed C. the hash should always be the same fixed size D. a message cannot be produced from a predefined has

private key cryptography

Symmetric cryptographic algorithms are also called _________. A. private key cryptography B. cipherkey cryptography C. public/private key cryptography D. public key cryptography

A. is weaker than NTLMv2

The Microsoft Windows LAN Manager hash ___________. A. is weaker than NTLMv2 B. is part of BitLocker C. is required to be present when using TPM D. is identical to MD-4

provides cryptographic services in hardware instead of software

The Trusted Platform Module (TPM)

hash

a_____ is not decrypted, but is only used for comparison purposes.

encrypting and decrypting e-mail attachments

hashing would not be used in which of the following examples?

Nonrepudiation

proving that a user sent an e-mail message is known as

In the directory structure of the file system

the areas of a file which steganography can hide data include all of the following except


संबंधित स्टडी सेट्स

Technology and its effects on modern america

View Set

The American Red Cross CPR Quiz Answers

View Set

THE FUNDAMENTAL THEOREM OF ALGEBRA

View Set

Cardiovascular Disorders Passpoint

View Set

EMU IT150/IA150 Networking -- Bemus Final

View Set

Chapter 12: The Supply of and Demand for Productive Resources

View Set

Microbiology by Bauman Chapter 9 Q & A

View Set