Cna 210 chapter 5

Ace your homework & exams now with Quizwiz!

How many modes of DES encryption exist

4

Diffie-Hellman Ephemeral (DHE)

A Diffie-Hellman key exchange that uses different keys.

Elliptic Curve Diffie-Hellman (ECDH)

A Diffie-Hellman key exchange that uses elliptic curve cryptography instead of prime numbers in its computation.

Blowfish

A block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits.

Trusted Platform Module (TPM)

A chip on the motherboard of the computer that provides cryptographic services.

block cipher

A cipher that manipulates an entire block of plain text at one time.

Pretty Good Privacy (PGP)

A commercial product that is commonly used to encrypt files and messages.

Message Digest (MD)

A common hash algorithm with several different versions.

sponge function

A cryptographic function that applies a process on the input that has been padded with additional characters until all characters are used.

Twofish

A derivation of the Blowfish algorithm that is considered to be strong.

RACE Integrity Primitives Evaluation Message Digest (RIPEMD)

A hash algorithm that uses two different and independent parallel chains of computation and then combines the result at the end of the process.

Hashed Message Authentication Code (HMAC)

A hash function that is applied to both the key and the message.

Diffie-Hellman (DH)

A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.

key

A mathematical value entered into a cryptographic algorithm to produce encrypted data.

Hardware Security Module (HSM)

A secure cryptographic processor.

Secure Hash Algorithm (SHA)

A secure hash algorithm that creates more secure hash values than Message Digest (MD) algorithms.

Data Encryption Standard (DES)

A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks.

Advanced Encryption Standard (AES)

A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES.

Triple Data Encryption Standard (3DES)

A symmetric cipher that was designed to replace DES.

ephemeral key

A temporary key that is used only once before it is discarded.

quantum cryptography

A type of asymmetric cryptography that attempts to use the unusual and unique behavior of microscopic objects to enable users to securely develop and share keys.

Which of these is the strongest symmetric cryptographic algorithm? a. Advanced Encryption Standard b. Data Encryption Standard c. Triple Data Encryption Standard d. Rivest Cipher (RC) 1

A. Advanced Encryption Standard

Which of these is NOT a characteristic of a secure hash algorithm? a. Collisions should be rare. b. The results of a hash function should not be reversed. c. The hash should always be the same fixed size. d. A message cannot be produced from a predefined hash.

A. Collisions should be rare.

Elliptic Curve Diffie-Hellman (ECDH) is an example of . a. in-band key exchange b. out-of-band key exchange c. SHA-1 key management d. AES key certification

A. in-band key exchange

What is data called that is to be encrypted by inputting it into an cryptographic algorithm? a. plaintext b. cleartext c. opentext d. ciphertext

A. plaintext

Which of these is NOT a basic security protection for information that cryptography can provide? a. risk loss b. integrity c. confidentiality d. authenticity

A. risk loss

This was Designed to replace DES

AES

RC4

An RC stream cipher that will accept keys up to 128 bits in length.

hash

An algorithm that creates a unique digital fingerprint.

stream cipher

An algorithm that takes one character and replaces it with one character.

elliptic curve cryptography (ECC)

An algorithm that uses elliptic curves instead of prime numbers to compute keys.

private key

An asymmetric encryption key that does have to be protected.

public key

An asymmetric encryption key that does not have to be protected.

digital signature

An electronic verification of the sender.

This Verifies the sender

Authentication

Authorized users can access it

Availability

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? a. Alice's private key b. Alice's public key c. Bob's public key d. Bob's private key

B. Alice's public key

Which of the following key exchanges uses the same keys each time? a. Diffie-Hellman Ephemeral (DHE) b. Diffie-Hellman (DH) c. Diffie-Hellman-RSA (DHRSA) d. Elliptic Curve Diffie-Hellman (ECDH)

B. Diffie-Hellman (DH)

What is the latest version of the Secure Hash Algorithm? a. SHA-2 b. SHA-3 c. SHA-4 d. SHA-5

B. SHA-3

A(n) is not decrypted but is only used for comparison purposes. a. stream b. digest c. algorithm d. key

B. digest

The Hashed Message Authentication Code (HMAC) . a. encrypts only the key b. encrypts the key and the message c. encrypts only the message d. encrypts the DHE key only

B. encrypts the key and the message

The areas of a file in which steganography can hide data include all of the following EXCEPT . a. in data that is used to describe the content or structure of the actual data b. in the directory structure of the file system c. in the file header fields that describe the file d. in areas that contain the content data itself

B. in the directory structure of the file system

A digital signature can provide each of the following benefits EXCEPT . a. prove the integrity of the message b. verify the receiver c. verify the sender d. enforce nonrepudiation

B. verify the receiver

International Data Encryption Algorithm (IDEA)

Block cipher that processes 64 bits with a 128-bit key with 8 rounds

Which asymmetric cryptographic algorithm is the most secure? a. SHA-2 b. BTC-2 c. RSA d. ME-14

C. RSA

Which protection is provided by hashing? a. authenticity b. confidentiality c. integrity d. availability

C. integrity

Proving that a user sent an email message is known as . a. repudiation b. integrity c. non-repudiation d. availability

C. non repudiation

plaintext

Cleartext data that is to be encrypted and decrypted by a cryptographic algorithm.

one-time pad (OTP)

Combining plaintext with a random key to create ciphertext that cannot be broken mathematically.

This Insures only authorized parties can view it

Confidentiality

Cryptography can provide five basic information protections what are they?

Confidentiality Integrity Availability Authentication Nonrepudiation

private key cryptography

Cryptographic algorithms that use a single key to encrypt and decrypt a message.

____ is the science of transforming information into an unintelligible form while it is being transmitted or stored so that unauthorized users cannot access it.

Cryptography

whole disk encryption

Cryptography that can be applied to entire disks.

asymmetric cryptographic algorithm

Cryptography that uses two mathematically related keys.

public key cryptography

Cryptography that uses two mathematically related keys.

Which of these has an on board key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can backup sensitive material in encrypted form? a. Trusted Platform Module (TPM) b. self-encrypting hard disk drives (HDDs) c. encrypted hardware-based USB devices d. Hardware Security Module (HSM)

D. Hardware Security Module (HSM)

All of the following can be broken mathematically EXCEPT a. AES b. 3DES c. SHA d. OTP

D. OTP

Which asymmetric encryption algorithm uses prime numbers? a. EFS b. quantum computing c. ECC d. RSA

D. RSA

6. Public key systems that generate random public keys that are different for each session are called . a. Public Key Exchange (PKE) b. Elliptic Curve Diffie-Hellman (ECDH) c. Diffie-Hellman (DH) d. perfect forward secrecy

D. perfect forward secrecy

The Trusted Platform Module (TPM) . a. allows the user to boot a corrupted disk and repair it b. is available only on Windows computers running BitLocker c. includes a pseudorandom number generator (PRNG) d. provides cryptographic services in hardware instead of software

D. provides cryptographic services in hardware instead of software

ciphertext

Data that has been encrypted

Both directions

Document encrypted with public key can be decrypted with corresponding private key, and document encrypted with private key can be decrypted with public key

symmetric cryptographic algorithm

Encryption that uses a single key to encrypt and decrypt a message.

out-of-band

Exchanging secure information outside the normal communication channels.

in-band

Exchanging secure information within normal communication channels.

What are some characteristics of secure hashing algorithm?

Fixed size Unique Original Secure

GNU Privacy Guard (GPG)

Free and open-source software that is commonly used to encrypt and decrypt data.

Three categories of cryptographic algorithms are what?

Hash algorithms Symmetric encryption algorithms Asymmetric encryption algorithms

steganography

Hiding the existence of data within another type of file.

This Insures information is correct and unaltered

Integrity

Important principles of Asymmetric Cryptographic Algorithm are what?

Key pairs Public key Private key Both directions

The predecessor of DES was product originally designed early 1970s by IBM, it was called what? that had key length of how many bits?

Lucifer 128 bits

Most common hash algorithms are?

Message Digest Secure Hash Algorithm Whirlpool RIPEMD

This algorithm Takes plaintext of any length and creates 128 bit hash

Message Digest 2

In this algorithm the Message length is padded to 512 bits.

Message digest 5

This Proves that a user performed an action

Nonrepudiation

This is the only known method to perform encryption that cannot be broken mathematically.

One-time pad

algorithm

Procedures based on a mathematical formula used to encrypt and decrypt the data.

perfect forward secrecy

Public key systems that generate random public keys that are different for each session.

Symmetric Encryption Algorithms examples are what?

RC4 International Data Encryption Algorithm (IDEA) Blowfish Twofish

What does SHA stand for?

Secure Hash Algorithm

A(n) ____ takes as input a string of any length, and returns a string of any requested variable length. ..... Cengage?

Sponge function

Message Digest 5 (MD5)

The current version of MD.

RSA

The most common asymmetric cryptography algorithm.

decryption

The process of changing ciphertext into plaintext.

encryption

The process of changing plaintext into ciphertext.

non-repudiation

The process of proving that a user performed an action.

key exchange

The process of sending and receiving secure cryptographic keys.

cryptography

The science of transforming information into a secure form so that unauthorized persons cannot access it.

digest

The unique digital fingerprint created by a one-way hash algorithm.

cleartext

Unencrypted data.

Hashed Message Authentication Code (HMAC) improves security how?

Using secret key possessed by sender and receiver Receiver uses key to decrypt the hash

Weakness of symmetric algorithms is what?

distributing and maintaining a secure single key among multiple users distributed geographically

Changing the original text to a secret message using cryptography is known as ____.

encryption

Hash creates a unique digital fingerprint of data through a process called what?

hashing

A(n) ____ is a mathematical value entered into the algorithm to produce ciphertext, or text that is "scrambled."

key

Symmetric encryption is also called what?

private key cryptography

Whereas cryptography scrambles a message so that it cannot be viewed, ____ hides the existence of the data.

steganography

Unlike hashing, these are designed to encrypt and decrypt the ciphertext

symmetric algorithms


Related study sets

MGMT-309 Exam III Review Questions

View Set

Period 5 (1750-1914) AP world map test full quizlet

View Set

Principles of Accounting Unit II assessment

View Set

Food Assistance Programs-In Class Handout

View Set

Biology 6.4 Traits, Genes, & Alleles

View Set