Chapter 12 QUIZ
Which of the following is a mathematical function or program that works with a key?
encryption algorithm
What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?
substitution cipher
Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated strong enough to protect classified data?
AES-256
Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?
Ciphertext
What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?
ECC
Which of the following is a range of allowable values that is used to generate an encryption key?
Keyspace
Symmetric algorithms use two keys that are mathematically related.
True
A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate?
X.509
What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?
chosen-plaintext
What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?
RSA