Chapter 2 - Cryptography - Final

Ace your homework & exams now with Quizwiz!

symmetric encryption

1. Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is __________ .

T

1. Symmetric encryption is used primarily to provide confidentiality.

D

1. The original message or data that is fed into the algorithm is __________. A. encryption algorithm B. secret key C. decryption algorithm D. plaintext

A

10. A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key. A. digital signature B. keystream C. one way hash function D. secret key

Electronic Frontier Foundation (EFF)

10. In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.

T

10. The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

T

11. Public-key cryptography is asymmetric.

electronic codebook (ECB)

11. The simplest approach to multiple block encryption is known as __________ mode, in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.

C

11. Transmitted data stored locally are referred to as __________ . A. ciphertext B. DES C. data at rest D. ECC

pseudorandom

12. A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.

B

12. Digital signatures and key management are the two most important applications of __________ encryption. A. private-key B. public-key C. preimage resistant D. advanced

F

12. Public-key algorithms are based on simple operations on bit patterns.

D

13. A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. A. mode of operation B. hash function C. cryptanalysis D. brute-force attack

public and private key

13. The __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.

F

13. The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

T

14. An important element in many computer security services and applications is the use of cryptographic algorithms.

A

14. Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator. A. keystream B. digital signature C. secure hash D. message authentication code

library-based tape encryption

14. __________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.

B

15. A _________ protects against an attack in which one party generates a message for another party to sign. A. data authenticator B. strong hash function C. weak hash function D. digital signature

T

15. Some form of protocol is needed for public-key distribution.

Diffie-Hellman Key Agreement

15. The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

A

2. The __________ is the encryption algorithm run in reverse. A. decryption algorithm B. plaintext C. ciphertext D. encryption algorithm

brute-force

2. There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and __________ attacks.

T

2. Two of the most important applications of public-key encryption are digital signatures and key management.

F

3. Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

decryption

3. The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext.

B

3. __________ is the scrambled message produced as output. A. Plaintext B. Ciphertext C. Secret key D. Cryptanalysis

cryptanalytic

4. A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

B

4. On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack. A. one-fourth B. half C. two-thirds D. three-fourths

T

4. The secret key is input to the encryption algorithm.

block cipher

5. A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.

C

5. The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________. A. SHA B. RSA C. AES D. DSS

F

5. Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits.

stream cipher

6. A __________ processes the input elements continuously, producing output one element at a time.

A

6. If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ . A. use longer keys B. use shorter keys C. use more keys D. use less keys

T

6. Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data

Diffie and Hellman

7. Public-key encryption was first publicly proposed by __________ in 1976.

F

7. The advantage of a stream cipher is that you can reuse keys.

C

7. __________ is a procedure that allows communicating parties to verify that received or stored messages are authentic. A. Cryptanalysis B. Decryption C. Message authentication D. Collision resistance

T

8. A message authentication code is a small block of data generated by a secret key and appended to a message.

D

8. The purpose of a __________ is to produce a "fingerprint" of a file, message, or other block of data. A. secret key B. digital signature C. keystream D. hash function

uniform distribution

8. The two criteria used to validate that a sequence of numbers is random are independence and _________ .

back-end appliance

9. A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.

F

9. Like the MAC, a hash function also takes a secret key as input.

B

9. __________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n. A. DSS B. RSA C. SHA D. AES


Related study sets

Musculoskeletal Practice Problems

View Set

Comp TIA A+ Cert Master 4.1 Virtualization and Cloud Computing Study

View Set

Unit 3 Part 1 - Dependency Theory

View Set

video equipment &a operations #2

View Set