CIT370 Ch 5

Ace your homework & exams now with Quizwiz!

Diffie-Hellman (DH)

Which of the following key exchanges uses the same keys each time?

Hardware Security Module (HSM)

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

a. risk loss

Which of these is NOT a basic security protection for information that cryptography can provide? a. risk loss b. integrity c. confidentiality d. authenticity

Collisions should be rare.

Which of these is NOT a characteristic of a secure hash algorithm?

Collisions should be rare.

Which of these is NOT a characteristic of a secure hash algorithm? Collisions should be rare. The results of a hash function should not be reversed. The hash should always be the same fixed size. A message cannot be produced from a predefined hash.

Advanced Encryption Standard

Which of these is the strongest symmetric cryptography algorithm?

integrity

Which protection is provided by hashing?

encrypts the key and the message

The Hashed Message Authentication Code (HMAC) __________.

provides cryptographic services in hardware instead of software

The Trusted Platform Module (TPM) _________.

b. in the directory structure of the file system

The areas of a file in which steganography can hide data include all of the following EXCEPT . a. in data that is used to describe the content or structure of the actual data b. in the directory structure of the file system c. in the file header fields that describe the file d. in areas that contain the content data itself

A block cipher encrypts plaintext at a fixed size whereas a sponge function takes an input string at any length

What are the differences between a block cipher and a sponge function?

A block cipher encrypts plaintext at a fixed size whereas a sponge function takes an input string at any length

What are the differences between a block cipher and a sponge function? A block cipher encrypts plaintext at a fixed size whereas a sponge function takes an input string at any length A block cipher is considered strictly an asymmetric cryptographic algorithm A sponge function requires much less processing power than a block cipher A block cipher inputs random additional characters into the data before encryption

plaintext

What is data called that is to be encrypted by inputting it into an cryptographic algorithm?

SHA-3

What is the latest version of the Secure Hash Algorithm?

32-bit systems

What type of system is blowfish designed to run efficiently on?

RSA

Which asymmetric cryptography algorithm is the most secure?

RSA

Which asymmetric encryption algorithm uses prime numbers?

The USB device can encrypt the hard drive of an attacker when they attempt to access data

Which of the following is NOT a benefit of USB device encryption?

It is a compact algorithm that could be considered ideal for smaller devices and appliances

Which of the following is an advantage of the Keccak algorithm?

Data in an unencrypted form

"Plaintext" is a term that is best described as what? Data in an unencrypted form An algorithm Text that has no formatting applied Data that has been encrypted

b. verify the receiver

A digital signature can provide each of the following benefits EXCEPT . a. prove the integrity of the message b. verify the receiver c. verify the sender d. enforce nonrepudiation

Redundancy

A digital signature does NOT provide which of the following? Integrity Nonrepudiation Redundancy Availability

digest

A(n) _____ is not decrypted but is only used for comparison purposes.

OTP

All of the following can be broken mathematically EXCEPT _____.

Hash algorithm

An encrypted digest is produced from what?

in-band key exchange

Elliptic Curve Diffie-Hellman (ECDH) is an example of _____.

Alice's public key

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Lattice-based

NTRUEncrypt is based on which cryptography method? Quantum-based Prim number based Lattice-based Elliptic curve cryptography

Resistance groups and operation teams during World War II

OTPs were originally used by whom? Security guards Resistance groups and operation teams during World War II Operating system developers Video game developers

non-repudation

Proving that a user sent an email message is known as .

perfect forward secrecy

Public key systems that generate random public keys that are different for each session are called _______.


Related study sets

History; Trouble Spots Around the World

View Set

Chapter 3 - Casualty (Liability) Basics

View Set

Types Of Policies: Life & Health Insurance ExamFX

View Set

Chapter 30, 31, 16: Adaptive Quizzes

View Set

prepU ch 22 Nursing Management of the Postpartum Woman at Risk

View Set

6.14: Overloading Functions, The exit() Function, Stubs and Drivers

View Set