chapter 9
Digital signatures require asymmetric key cryptography.
TRUE
A digitized signature is a combination of a strong hash of a message and a secret key.
FALSE
A private key cipher is also called an asymmetric key cipher.
FALSE
Product cipher is an encryption algorithm that has no corresponding decryption algorithm.
FALSE
The term certificate authority (CA) refers to a trusted repository of all public keys.
FALSE
You must always use the same algorithm to encrypt information and decrypt the same information.
FALSE
A person demonstrates anonymity when posting information to a web discussion site without authorities knowing who he or she is.
TRUE
A salt value is a set of random characters you can combine with an actual input key to create the encryption key.
TRUE
A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks.
TRUE
Integrity-checking tools use cryptographic methods to make sure nothing and no one has modified the software.
TRUE
Message authentication confirms the identity of the person who started a correspondence.
TRUE
The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).
TRUE
The financial industry created the ANSI X9.17 standard to define key management procedures.
TRUE
The hash message authentication code (HMAC) is a hash function that uses a key to create a hash, or message digest.
TRUE