CIS Chapter 8
XOR
Bit stream methods commonly use algorithm functions like the exclusive OR operation.
DDS
Digital signatures should be created using processes and products that are based on the
160
SHA-1 produces a(n) ____-bit message digest, which can then be used as an input to a digital signature algorithm
SSL Record Protocol
The ____ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.
RSA
The___ algorithm developed in 1977 was the first public key encryption algorithm published for commercial use.
AH
The___ protocol provides system-to-system authentication and data integrity verification but does not provide secrecy for the content of a network communication.
AES
___ is the current federal information processing standards that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense instrastructure.
Key
___ is the information used in conjunction with an algorithm to create the cipher text from the plaintext or derive the plaintext from the cipher text.
Hash
____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.
PGP
____ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.
Work Factor
____ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown.
Encryption
____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
PGP
____ was developed by Phil Zimmermann and uses the IDEA Cipher for message encoding
PKI
_____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.
IPSec
is a protocol that can be used to secure communication across any IP-based network such as LANs, WANs, and the Internet.
symetric
A method of encryption that requires the same secret key to encipher and decipher the message is known as ___ encryption.
MAC
A___ is a key-dependent, one-way hash function that allows only specific recipients to access the message digest.
distinguish name
An X.509 v3 certificate binds a___ which uniquely identifies a certificate entity, to a user's public key.