Chapter 2 - Cryptographic Tools (Computer Security: Principles and Practice, 2nd Edition)

Ace your homework & exams now with Quizwiz!

back-end appliance

A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.

B

A _________ protects against an attack in which one party generates a message for another party to sign. A. data authenticator B. strong hash function C. weak hash function D. digital signature

cryptanalytic

A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

A

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key. A. digital signature B. keystream C. one way hash function D. secret key

D

A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. A. mode of operation B. hash function C. cryptanalysis D. brute-force attack

stream cipher

A __________ processes the input elements continuously, producing output one element at a time.

block cipher

A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.

pseudorandom

A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.

T

A message authentication code is a small block of data generated by a secret key and appended to a message.

symmetric encryption

Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is __________ .

T

An important element in many computer security services and applications is the use of cryptographic algorithms.

A

Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator. A. keystream B. digital signature C. secure hash D. message authentication code

F

Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

B

Digital signatures and key management are the two most important applications of __________ encryption. A. private-key B. public-key C. preimage resistant D. advanced

A

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ . A. use longer keys B. use shorter keys C. use more keys D. use less keys

Electronic Frontier Foundation (EFF)

In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.

F

Like the MAC, a hash function also takes a secret key as input.

T

Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data

B

On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack. A. one-fourth B. half C. two-thirds D. three-fourths

F

Public-key algorithms are based on simple operations on bit patterns.

T

Public-key cryptography is asymmetric.

Diffie and Hellman

Public-key encryption was first publicly proposed by __________ in 1976.

T

Some form of protocol is needed for public-key distribution.

T

Symmetric encryption is used primarily to provide confidentiality.

decryption

The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext.

public and private key

The __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.

A

The __________ is the encryption algorithm run in reverse. A. decryption algorithm B. plaintext C. ciphertext D. encryption algorithm

D

The purpose of a __________ is to produce a "fingerprint" of a file, message, or other block of data. A. secret key B. digital signature C. keystream D. hash function

F

The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

Diffie-Hellman Key Agreement

The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

T

The secret key is input to the encryption algorithm.

electronic codebook (ECB)

The simplest approach to multiple block encryption is known as __________ mode, in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.

T

The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

uniform distribution

The two criteria used to validate that a sequence of numbers is random are independence and _________ .

brute-force

There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and __________ attacks.

C

Transmitted data stored locally are referred to as __________ . A. ciphertext B. DES C. data at rest D. ECC

F

Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits.

T

Two of the most important applications of public-key encryption are digital signatures and key management.

B

__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n. A. DSS B. RSA C. SHA D. AES

C

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic. A. Cryptanalysis B. Decryption C. Message authentication D. Collision resistance

library-based tape encryption

__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.

B

__________ is the scrambled message produced as output. A. Plaintext B. Ciphertext C. Secret key D. Cryptanalysis

D

The original message or data that is fed into the algorithm is __________. A. encryption algorithm B. secret key C. decryption algorithm D. plaintext

F

The advantage of a stream cipher is that you can reuse keys.

C

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________. A. SHA B. RSA C. AES D. DSS


Related study sets

Patho Concept, Scope, and Common Terms of Pathophysiology Sherpath Lesson

View Set

EMS Chapter 3 - Medical, Legal, and Ethical Issues

View Set

Fundamentals of ST; Chapter 9: Select the Correct Answer Exercise 9.03

View Set

P&C Acronyms - Broad Form Perils (BIG AFFECT)

View Set