Global Security Chapter 3 & 4
Which of these is not a characteristic of a secure hash algorithm?
Collisions should be rare.
Plaintext
Data called that is to be encrypted by inputting it into a cryptographic algorithm.
Extended Validation (EV) Certificate
Digital certificate displays the name of the entity behind the website.
Crypto Service Provider
Entity calls in crypto modules to perform cryptographic tasks.
Hardware Security Module (HSM)
Has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form.
Hashed Message Authentication Code (HMAC)
Hashes the key and the message.
Alice's public key
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
Which areas of a file cannot be used by steganography to hide data?
In the directory structure of the file system.
Which statement is not true regarding hierarhical trust models?
It is designed fro use on a large scale.
Trusted Platform Module (TPM)
It provides cryptographic services in hardware instead of software.
Diffie-Hellman (DH)
Key exchange uses the same keys each time.
Risk Loss
Not a basic security protection for information that cryptography can provide.
Variability
Not a method for strengthening a key.
Digest
Not decrypted but is only used for comparison purposes.
Authorization
Not part of the certification life cycle.
Online Certificate Status Protocol (OCSP)
Performs real-time lookup of a certificate's status
Non-repudiation
Proving that a user sent and email message.
Perfect Forward Secrecy
Public key systems that generate random public keys that are different for each session.
Advanced Encryption Standard
Strongest symmetric cryptographic algorithm.
Session Keys
Symmetric keys to encrypt and decrypt information exchanged during the session and to verify its integrity.
Certificate Repository (CR)
A centralized directory of digital certificates is called a(n) ________.
Secure Shell (SSH)
A protocol for securely accessing a remote computer.
Certification Policy (CP)
A published set of rules that govern the operation of a PKI.
Key Escrow
A situation in which keys are managed by a third party, such as a trusted CA.
Salt
A value that can be used to ensure that hashed plaintext will not consistently result in the same digest.
0
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum?
Certificate Authority (CA)
An entity that issues digital certificates.
Verify the Receiver
Benefits the digital signature cannot provide.
Cipher Block Chaining (CBC)
Block ciphers XORs each block of plaintext with the previous block of cipher text before being encrypted.
Confusion
The key should not relate in a simple way to the cipher text.
ROT13
The key showed that the entire alphabet was rotated 13 steps.
SHA-3
The latest version of the Secure Hash Algorithm.
Public Key Infrastructure (PKI)
The management of digital certificates.
RSA
The most secure asymmetric cryptographic algorithm.
TLS v1.2
The strongest cryptographic transport protocol.
Digital Certificate
The strongest technology that would assure Alice that Bob is the sender of a message.
A digital certificate associates
The user's identity with his public key
Digital certificates can be used fro each of these except
To verify the authenticity of the Registration Authorizer.
Bridge
Which trust model has multiple CAs, one of which acts as a facilitator?