Ch. 9 Assessment
Which of the following is one of the four basic forms of a cryptographic attack?
A. Ciphertext-only attack B. Known-plaintext attack C. Chosen-plaintext attack D. Chosen-ciphertext attack
Which information security objective allows trusted entities to endorse information?
Certification
A __________ signature is a representation of a physical signature stored in a digital format.
Digitized
The act of scrambling plaintext into ciphertext is known as __________.
Encryption
Product cipher is an encryption algorithm that has no corresponding decryption algorithm.
False
A __________ is used to detect forgeries.
Hash function
__________ corroborates the identity of an entity, whether the sender, the sender's computer, some device, or some information.
Nonrepudiation
A strong hash function is designed so that a forged message cannot result in the same hash as a legitimate message.
True
A substitution cipher replaces bits, characters, or blocks of information with other bits, characters, or blocks.
True
Encryption ciphers fall into two general categories: symmetric (private) key and asymmetric (public) key.
True
The two basic types of ciphers are transposition and substitution.
True
An algorithm used for cryptographic purposes is known as a __________.
Cipher
__________ offers a mechanism to accomplish four security goals: confidentiality, integrity, authentication, and nonrepudiation.
Cryptography
An encryption cipher that uses the same key to encrypt and decrypt is called a(n) __________ key.
Symmetric (private)
DES, IDEA, RC4, and WEP are examples of __________.
Symmetric algorithms (or standards)DES, IDEA, RC4, and WEP are examples of __________.
A salt value is a set of random characters you can combine with an actual input key to create the encryption key.
True