Computer Security Midterm CH3

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

cryptanalytic

A _________________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

stream cipher

A _________________ processes the input elements continuously, producing output one element at a time.

block cipher

A _________________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.

T

A message authentication code is a small block of data generated by a secret key and appended to a message. True or False

symmetric encryption

Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is _______________________ .

F

Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. True or False

use longer keys

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ .

T

Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data. True or False

half

On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack.

Diffie and Hellman

Public-key encryption was first publicly proposed by _________________ in 1976.

T

Symmetric encryption is used primarily to provide confidentiality. True or False

decryption algorithm

The __________ is the encryption algorithm run in reverse.

decryption

The ________________ algorithm takes the ciphertext and the secret key and produces the original plaintext.

F

The advantage of a stream cipher is that you can reuse keys. True or False

AES

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.

plaintext

The original message or data that is fed into the algorithm is __________.

hash function

The purpose of a __________ is to produce a "fingerprint" of a file, message, or other block of data.

T

The secret key is input to the encryption algorithm. True or False

uniform distribution

The two criteria used to validate that a sequence of numbers is random are independence and _________ .

brute-force

There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and _______________________ attacks.

F

Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits. True or False

T

Two of the most important applications of public-key encryption are digital signatures and key management. True or False

Message authentication

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

Ciphertext

__________ is the scrambled message produced as output.


Set pelajaran terkait

ACCT Chapter 12 - Reporting and Analyzing Cash Flows

View Set

Chapter 9, Chapter 8, Chapter 10, Chapter 11

View Set

Biology - Unit 1, Taxonomy and Origins - Quiz 4

View Set

CCNA Introduction to Networks Chapter 6

View Set

The functions of things like the seminal vesicles, fallopian tubes, prostate gland, bulbourethral glands, mammary glands, vas deferens, dartos and cremaster muscles, pampiform plexus, epididymis, etc...

View Set

Art 1301 - Exam 2 - Douglas Peck - Part 2

View Set

Chapter 10 - Small Business Promotion: Capturing the Eyes of Your Market

View Set

ap gov required documents | unit 2

View Set