Cyber Security - Ch 8

Ace your homework & exams now with Quizwiz!

False

3DES was created to offer the same strength as the DES algorithm but ran three times as fast, thus saving time.

False

A brute force function is a mathematical algorithm that generates a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity.

False

A cryptovariable is a value representing the application of a hash algorithm on a message.

trapdoor

A mathematical ________ is a secret mechanism that enables you to easily accomplish the reverse function in a one-way function.

digest

A message ___________ is a fingerprint of the author's message that is compared with the recipient's locally calculated hash of the same message.

cipher

A(n) _________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption.

monoalphabetic

A(n) ____________________ substitution uses one alphabet.

True

A(n) distinguished name uniquely identifies a certificate entity to a user's public key.

True

AES implements a block cipher called the Rijndael Block Cipher.

False

Adopted by NIST in 1976 as a federal standard, DES uses a 64-bit block size and key.

False

Asymmetric encryption systems use a single key to both encrypt and decrypt a message.

False

Common implementations of a registration authority (RA) include functions to issue digital certificates to users and servers.

64

DES uses a(n) __________ bit block size

Digital certificates are electronic documents that contain the key value and other important information. They are container files that enable computers to validate keys and identify where they came from.

Describe digital certificates.

Hash functions are math based algorithms that create a message summary to confirm the message integrity and identity. They convert variable length messages into single fixed length. They are commonly used in password verification systems to confirm the user identity.

Describe how hash functions work and what they are used for.

Message authentication

Hashing functions do not require the use of keys, but it is possible to attach a __________________ code to allow only specified recipients to access the message digest.

True

In 1917, Gilbert S. Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key.

False

In 1953, Giovan Batista Bellaso introduced the idea of the passphrase (password) as a key for encryption.

transport

In IPSec __________ mode, only the IP data is encrypted, not the IP headers.

False

In a book cipher, the key consists of a list of codes representing the page number, line number, and word number of the plaintext word.

registration

In the context of a PKI, a(n) ___________ authority operates under the trusted collaboration of the certificate authority and can be delegated day-to-day certification functions, such as verifying registration information about new registrants, generating end-user keys, revoking certificates, and validating that users possess a valid certificate.

False

In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet.

True

Internet Protocol Security (IPSec) is an open-source protocol framework for security development within the TCP/IP family of protocols.

polyalphabetic

More advanced substitution ciphers use two or more alphabets, and are referred to as __________ substitutions.

True

One encryption method made popular by spy movies involves using the text in a book as the key to decrypt a message.

DES

One of the most widely known cryptographic algorithms is the ______, which was developed by IBM and is based on the company's Lucifer algorithm.

True

Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.

False

Port Address Translation assigns non-routing local addresses to computer systems in the local area network and uses ISP-assigned addresses to communicate with the Internet on a one-to-one basis.

True

Pretty Good Privacy (PGP) uses the freeware ZIP algorithm to compress the message after it has been digitally signed but before it is encrypted.

True

Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures

True

Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures.

160

SHA-1 produces a(n) _______-bit message digest, which can then be used as an input to a digital signature algorithm.

True

Secure Electronic Transactions was developed by MasterCard and Visa in 1997 to protect against electronic payment fraud.

False

Standard HTTP (S-HTTP) is an extended version of the Hypertext Transfer Protocol that provides for the encryption of individual messages transmitted via the Internet between a client and server.

False

Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message.

False

The S-HTTP security solution provides six services: authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management.

transposition

The _________ cipher simply rearranges the values within a block to create the ciphertext.

RSA

The __________ algorithm, developed in 1977, was the first public-key encryption algorithm published for commercial use.

XOR.

The __________ operation is a function of Boolean algebra in which two bits are compared, and if the two bits are identical, the result is a binary 0.

SSL Record Protocol

The ___________ is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.

payload

The encapsulating security _________ protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.

True

The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.

True

The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public-key encryption.

True

The most popular modern version of steganography involves hiding information within files that contain digital pictures or other images.

False

The number of horizontal and vertical pixels captured and recorded is known as the image's contrast.

cryptanalysis

The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption is called __________

Advanced

The successor to 3DES is the ___________Encryption Standard.

encipher

To _________ means to encrypt, encode, or convert plaintext into the equivalent ciphertext.

False

To encipher means to decrypt, decode, or convert ciphertext into the equivalent plaintext.

False

To perform the Caesar cipher encryption operation, the pad values are added to numeric values that represent the plaintext that needs to be encrypted.

substitution

To use a(n) __________ cipher, you substitute one value for another.

False

UltraViolet wireless (UVW) is a de facto industry standard for short-range wireless communications between devices.

False

Usually, as the length of a cryptovariable increases, the number of random guesses that have to be made in order to break the code is reduced.

Encryption

________ is the process of converting an original message into a form that is unreadable to unauthorized individuals.

Keyspace

__________ is the entire range of values that can be used to construct an individual key

Key or Cryptovariable

__________ is the information used in conjunction with the algorithm to create the ciphertext from plaintext

Code

__________ is the process of converting components of an unencrypted message into encrypted components

digital signatures

___________ are encrypted message components that can be mathematically proven to be authentic.

Algorithm

___________ is the mathematical formula or method used to convert an unencrypted message into an encrypted message

Steganography

___________ is the process of hiding messages

Work Factor

___________- is the amount of effort (expressed in units of time) required to perform cryptanalysis on an encoded message

Link encryption

____________ is a series of encryptions and decryptions between a number of systems where each system in a network decrypts the message sent to it and then re-encrypts the message using different keys and sends it to the next neighbor

Decipher (Decrypt)

____________ is the process of converting an encoded or enciphered message back to its original readable form (plaintext)

Plaintext or Cleartext

_____________ is the original unencrypted message that is encrypted and is the result of successful decryption

Block Cipher

______________ is an encryption method that involves dividing the plaintext into blocks or sets of bits and then converting the plaintext to ciphertext one block at a time

Bit stream cipher

________________ is an encryption method the involved converting plaintext into ciphertext one bit at a time

Ciphertext

__________or cryptogram is the unintelligible encrypted or encoded message

PGP

________was developed by Phil Zimmermann and uses the IDEA cipher for message encoding.


Related study sets

Module 26: How we Learn and Classical Conditioning (AP Psych Unit 6)

View Set

Chapter 1 Review: Introduction to Animals

View Set

Chemical Change Definition in Chemistry (questions on article)

View Set

Neuroanatomy: cortical anatomy, thalamus, basal ganglia, hypothalamus, hippocampus

View Set