Chapt 3

Ace your homework & exams now with Quizwiz!

Secure Electronic Transactions (SET) 1. A protocol developed by credit card companies to protect against electronic payment fraud. 2. The primary and now dominant cryptographic authentication and encryption product of the IETF's IP Protocol Security Working Group 3. In IPSec, an encryption method in which only a packet's IP data is encrypted 4. A cryptographic technique developed at AT&T and known as the "one-time pad," this cipher uses a set of characters for encryption operations only one time and then discards it.

A protocol developed by credit card companies to protect against electronic payment fraud.

Privacy-Enhanced Mail (PEM) 1. A standard proposed by the TIA that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. 2. A standard proposed by the IETF that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. 3. A standard proposed by the IEEE that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures. 4. A standard proposed by the NIST that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures.

A standard proposed by the IETF that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures.

In cryptography, ___________ is the programmatic steps to convert an unencrypted message into an encrypted message, and vice versa Algorithm Cipher Data Encryption Standard (DES) Cryptanalysis

Algorithm

All the following are true about Wi-Fi Protected Access (WPA and WPA2) except: Created to resolve issues with WEP 128-bit key size Considered weak today Uses dynamically changing keys

Considered weak today

_________________ is the process of obtaining the original message from an encrypted message without knowing the keys used to perform the encryption. Cryptanalysis Cryptography Steganography Ciphertext

Cryptanalysis

Public-key container files that allow PKI system components and end users to validate a publickey and identify its owner.

Digital certificates

All the following are true about Secure Sockets Layer (SSH) except: Protocol used for public-key encryption Provides a secure channel over the Internet Encrypts individual messages transmitted over the Internet Used in most popular browsers

Encrypts individual messages transmitted over the Internet

A hash function and code have the same basic definition. True False

False

Dictionaries and paper (thesauruses) are commonly used Cryptology techniques for the Book or Running Key Cipher True False

False

Encrypted message components that can be mathematically proven as authentic is called nonrepudiation True False

False

Generally, an encryption key that is valid for only the duration of one communication session between two host computers is called station key. True False

False

Substitution cipher is an encryption method in which one value is not usually substituted for another. True False

False

The process of converting an encoded or enciphered message (ciphertext) back to its original readable form (plaintext) is known an defraction. True False

False

Plaintype is what you call the original message, before any encryption is applied True False

False (Plaintext)

The following are true about ________________: Mathematical algorithms Used to confirm whether message content has changed Confirms message identity and integrity Cannot be used to determine message contents

Hash Functions

Digital Signature Standard (DSS) Selected Answer: The NIST standard for digital signature algorithm usage by federal information systems. 1. The NIST standard for digital signature algorithm usage by federal information systems. 2. A standard issued by the National Institute of Standards and 3. Technology (NIST) that specifies secure algorithms, such as SHA-1, for computing a condensed representation of a message or data file. 4. A substitution cipher that only incorporates a single alphabet in the encryption process.

The NIST standard for digital signature algorithm usage by federal information systems.

Secure Hash Standard (SHS) The standard for encryption currently recommended by CIA The standard for encryption currently recommended by NSA The standard for encryption currently recommended by NIST The standard for encryption currently recommended by Google

The standard for encryption currently recommended by NIST

An attacker gained physical access to your computer. In which situation will the attacker not be successful at retrieving the contents of a file located inside the TrueCrypt encrypted volume? The volume was disengaged The volume was dismounted The volume was discounted The volume was discontinued

The volume was dismounted

A key is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext True False

True

Protecting against rainbow cracking includes all except: Protect the file of hashed passwords Limit login attempts Hash salting Using peer-to-peer networks

Using peer-to-peer networks

nonrepudiation is: 1. Generally, an encryption key that is valid for only the duration of one communication session between two host computers 2. The process of rearranging plaintext values to form ciphertext 3. The original message, before any encryption is applied 4. Verification that a message was sent by a particular sender and cannot be refuted.

Verification that a message was sent by a particular sender and cannot be refuted.

The amount of effort (usually expressed in units of time) required to perform cryptanalysis on an encoded message Work factor Crack factor Secure Hash Standard (SHS) Steganography

Work factor

In PKI, a third party that manages users' digital certificates.

certificate authority (CA)

In the 12th century, Latin translations of Mohammad ibn Musa al-Khwarizmi's work on the Indian numerals introduced the ______________________ to the Western world. encryption number process advanced type of substitution cipher a condensed representation of a message or data file. decimal number system

decimal number system

A key that can be used in symmetric encryption both to encipher and decipher the message.

secret key

A cryptographic method in which the same algorithm and secret key are used both to encipher and decipher the message.

symmetric encryption


Related study sets

MKT 291 Ch. 3 Understanding the Environment, Ethical Behavior and Social Responsibility

View Set

Small Business Management - Exam 4

View Set

Customer Service Quizizz on Questions 11 - 30

View Set

Astronomy Ch. 13 Uranus and Neptune: The outer Worlds of the Solar System

View Set

Chapter 8&9 Antiinfective Agents& Antibiotics

View Set

Analyzing and Evaluating Arguments 100%

View Set

MAR 5625 - Marketing Research and Analytics - Chapter 9

View Set

Topic 1: Understanding Entrepreneurship

View Set