Chapter 12 QUIZ

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is a mathematical function or program that works with a key?

encryption algorithm

What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?

substitution cipher

Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated strong enough to protect classified data?

AES-256

Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?

Ciphertext

What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?

ECC

Which of the following is a range of allowable values that is used to generate an encryption key?

Keyspace

Symmetric algorithms use two keys that are mathematically related.

True

A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate?

X.509

What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?

chosen-plaintext

What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?

RSA


संबंधित स्टडी सेट्स

Chapter 11: Public Speaking Preparation

View Set

Intro to business. How to form a business

View Set

HB1: Cellular Function and Medical Genetics

View Set

Section 2.2.1 - Identification, and Authentication

View Set

Laboratory Management - Financial Management

View Set

Understanding Business: Chapter 5

View Set

MacOS Support Essentials 10.14 Part Five: Applications and Processes Lesson 18—Install Apps

View Set

Varcarolis: Chapter 18 eating and feeding disorders, Ch 24 Varcarolis; Personality Disorders

View Set

Geography W-12 Final Study Guide

View Set