Chapt 3
Secure Electronic Transactions (SET) 1. A protocol developed by credit card companies to protect against electronic payment fraud. 2. The primary and now dominant cryptographic authentication and encryption product of the IETF's IP Protocol Security Working Group 3. In IPSec, an encryption method in which only a packet's IP data is encrypted 4. A cryptographic technique developed at AT&T and known as the "one-time pad," this cipher uses a set of characters for encryption operations only one time and then discards it.
A protocol developed by credit card companies to protect against electronic payment fraud.
Privacy-Enhanced Mail (PEM) 1. A standard proposed by the TIA that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. 2. A standard proposed by the IETF that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. 3. A standard proposed by the IEEE that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. 4. A standard proposed by the NIST that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures.
A standard proposed by the IETF that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures.
In cryptography, ___________ is the programmatic steps to convert an unencrypted message into an encrypted message, and vice versa Algorithm Cipher Data Encryption Standard (DES) Cryptanalysis
Algorithm
All the following are true about Wi-Fi Protected Access (WPA and WPA2) except: Created to resolve issues with WEP 128-bit key size Considered weak today Uses dynamically changing keys
Considered weak today
_________________ is the process of obtaining the original message from an encrypted message without knowing the keys used to perform the encryption. Cryptanalysis Cryptography Steganography Ciphertext
Cryptanalysis
Public-key container files that allow PKI system components and end users to validate a publickey and identify its owner.
Digital certificates
All the following are true about Secure Sockets Layer (SSH) except: Protocol used for public-key encryption Provides a secure channel over the Internet Encrypts individual messages transmitted over the Internet Used in most popular browsers
Encrypts individual messages transmitted over the Internet
A hash function and code have the same basic definition. True False
False
Dictionaries and paper (thesauruses) are commonly used Cryptology techniques for the Book or Running Key Cipher True False
False
Encrypted message components that can be mathematically proven as authentic is called nonrepudiation True False
False
Generally, an encryption key that is valid for only the duration of one communication session between two host computers is called station key. True False
False
Substitution cipher is an encryption method in which one value is not usually substituted for another. True False
False
The process of converting an encoded or enciphered message (ciphertext) back to its original readable form (plaintext) is known an defraction. True False
False
Plaintype is what you call the original message, before any encryption is applied True False
False (Plaintext)
The following are true about ________________: Mathematical algorithms Used to confirm whether message content has changed Confirms message identity and integrity Cannot be used to determine message contents
Hash Functions
Digital Signature Standard (DSS) Selected Answer: The NIST standard for digital signature algorithm usage by federal information systems. 1. The NIST standard for digital signature algorithm usage by federal information systems. 2. A standard issued by the National Institute of Standards and 3. Technology (NIST) that specifies secure algorithms, such as SHA-1, for computing a condensed representation of a message or data file. 4. A substitution cipher that only incorporates a single alphabet in the encryption process.
The NIST standard for digital signature algorithm usage by federal information systems.
Secure Hash Standard (SHS) The standard for encryption currently recommended by CIA The standard for encryption currently recommended by NSA The standard for encryption currently recommended by NIST The standard for encryption currently recommended by Google
The standard for encryption currently recommended by NIST
An attacker gained physical access to your computer. In which situation will the attacker not be successful at retrieving the contents of a file located inside the TrueCrypt encrypted volume? The volume was disengaged The volume was dismounted The volume was discounted The volume was discontinued
The volume was dismounted
A key is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext True False
True
Protecting against rainbow cracking includes all except: Protect the file of hashed passwords Limit login attempts Hash salting Using peer-to-peer networks
Using peer-to-peer networks
nonrepudiation is: 1. Generally, an encryption key that is valid for only the duration of one communication session between two host computers 2. The process of rearranging plaintext values to form ciphertext 3. The original message, before any encryption is applied 4. Verification that a message was sent by a particular sender and cannot be refuted.
Verification that a message was sent by a particular sender and cannot be refuted.
The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message Work factor Crack factor Secure Hash Standard (SHS) Steganography
Work factor
In PKI, a third party that manages users' digital certificates.
certificate authority (CA)
In the 12th century, Latin translations of Mohammad ibn Musa al-Khwarizmi's work on the Indian numerals introduced the ______________________ to the Western world. encryption number process advanced type of substitution cipher a condensed representation of a message or data file. decimal number system
decimal number system
A key that can be used in symmetric encryption both to encipher and decipher the message.
secret key
A cryptographic method in which the same algorithm and secret key are used both to encipher and decipher the message.
symmetric encryption