Home
Subjects
Expert solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
- Science
- Computer Science
- Computer Security and Reliability
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (40)
Symmetric algorithms support confidentiality, but not authentication and nonrepudiation.
True/False
True
AES uses a 128-bit key and is used in PGP encryption software.
True/False
False
Symmetric algorithms use two keys that are mathematically related.
False
Asymmetric algorithms are more scalable than symmetric algorithms.
True/False
True
ECC is an efficient algorithm requiring few hardware resources, so it's a perfect candidate for wireless devices and cell phones.
True/False
True
Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which of the following.
ciphertext
Which of the following is the process of converting ciphertext back into plaintext.
decryption
What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?
substitution cipher
If a security expert decides to study the process of breaking encryption algorithms, they are performing which of the following?
cryptanalysis
Which of the following is a mathematical function or program that works with a key?
encryption algorithm
Which of the following is a range of allowable value that is used to generate an encryption key?
keyspace
What type of system converts between plaintext and ciphertext?
cryptosystem
Which of the following refers to verifying the sender or receiver (or both) is who they clam to be?
Authentication
Which function ensures that a sender and receiver cannot deny sending or receiving a specific message?
Nonrepudiation
Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?
symmetric
Whcih type of symmertic algorithm operates on plaintext one bit at a time?
stream ciphers
Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated strong enough to protect classified data?
AES-256
What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?
RSA
What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?
ECC
Which of the following is a function that takes a variable-length string or message and produces a fixed-length string message digest?
hashing algorithm
A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate?
X.509
In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?
ciphertext-only
What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?
chosen-plaintext
What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?
known plaintext
In what type of attack does the attacker need access to cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results?
chosen-chiphertext
What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?
brute force
When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing?
dictionary
What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher?
SSL/TLS downgrade attack
Which of the following is a scripting language for Windows and Linux that performs repetitive tasks, such as password cracking?
EXPECT
What application is considered the original password-cracking program and is now used by many government agencies to test for pasword strength?
L0phtcrack
Uses two keys: one to encrypt data and one to decrypt data
asymmetric algorythim
Encryption algorithm used for the Data Encryption Standard
DEA
Uses a single key to encrypt and decrypt data
symmetric algorithm
A digital document that verififes the two parties exchanging data over the internet are really who they claim to be
certificate
Used for verification, takes a variable-length input and converts it to a fixed-length output string
hashing algorithm
Used to find the same has value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm
birthday attacks
Operate on plaintext one bit at a time
stream cipher
A structure consisting of programs, protocols, and security policies for encrypting data and uses public key cryptography to protect data transmitted over the internet
PKI
A sequence of random bits generated from a range of allowable values
key
The use of random data alongside plaintext as an input to a hashing function so that the output is unique
salt
Recommended textbook solutionsJava Programming
8th EditionJoyce Farrell
513 solutions
Java How to Program (Early Objects)
10th EditionHarvey M. Deitel, Paul J. Deitel
356 solutions
Data Structures and Algorithms in Java
6th EditionRoberto Tamassia
565 solutions
Starting Out with Python
2nd EditionTony Gaddis
601 solutions
Sets with similar termsITEC 472 Chapter 12
25 terms
DJFATWILL
ITEC 472 Entire Final
93 terms
DJFATWILL
Hands-On Ethical Hacking and Network Defense - Ch.…
45 terms
Justin_Crews
Ethical Hacking and Security - Chapter 12 - Crypto…
44 terms
harry_zee
Other sets by this creatorAP Gov Vocab
17 terms
JohnSAlloway
AP Computer Science Unit 2 Vocab
32 terms
JohnSAlloway
AP Literature Vocab
10 terms
JohnSAlloway
Test 4 Dates
17 terms
JohnSAlloway
Verified questions
COMPUTER SCIENCE
What value will be stored in the variable t after each of the following statements executes?A) t = (12 > 1); _______ B) t = (2 < 0); C) t = (5 == (3 * 2)); D) t = (5 == 5); _______
Verified answer
COMPUTER SCIENCE
What derived class is named in the line below? class Pet : public Dog
Verified answer
COMPUTER SCIENCE
What is the purpose of using a “salt” along with the user-provided password? Where should the “salt” be stored, and how should it be used?
Verified answer
COMPUTER SCIENCE
Write a method called sumArray that accepts an array of floating point values and returns the sum of the values stored in the array.
Verified answer
Other Quizlet setsAP Art History Slide Quiz #8
20 terms
Marwa_Aminzay
Biology Chapter 2 Questions
27 terms
BellaMac7
FCS Test 1 MIC Intro (Lecture 1)
87 terms
Lynley_Choate1
biology past paper corrections
27 terms
dihasya
Related questionsQUESTION
File Transfer Protocol (FTP) is a client-server protocol that enables the transfer of files between computers over a network.
2 answers
QUESTION
n. in an exit device, a mechanism used to temporarily disable the latch from locking
2 answers
QUESTION
How does a block cipher handle plaintext input?
15 answers
QUESTION
The problem of computer generated passwords is that the passwords are easy to guess.
2 answers