What encryption algorithm is efficient requiring few resources and is based on complex algebra and calculations on curves?

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (40)

Symmetric algorithms support confidentiality, but not authentication and nonrepudiation.

True/False

True

AES uses a 128-bit key and is used in PGP encryption software.

True/False

False

Symmetric algorithms use two keys that are mathematically related.

False

Asymmetric algorithms are more scalable than symmetric algorithms.

True/False

True

ECC is an efficient algorithm requiring few hardware resources, so it's a perfect candidate for wireless devices and cell phones.

True/False

True

Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which of the following.

ciphertext

Which of the following is the process of converting ciphertext back into plaintext.

decryption

What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?

substitution cipher

If a security expert decides to study the process of breaking encryption algorithms, they are performing which of the following?

cryptanalysis

Which of the following is a mathematical function or program that works with a key?

encryption algorithm

Which of the following is a range of allowable value that is used to generate an encryption key?

keyspace

What type of system converts between plaintext and ciphertext?

cryptosystem

Which of the following refers to verifying the sender or receiver (or both) is who they clam to be?

Authentication

Which function ensures that a sender and receiver cannot deny sending or receiving a specific message?

Nonrepudiation

Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?

symmetric

Whcih type of symmertic algorithm operates on plaintext one bit at a time?

stream ciphers

Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated strong enough to protect classified data?

AES-256

What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?

RSA

What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?

ECC

Which of the following is a function that takes a variable-length string or message and produces a fixed-length string message digest?

hashing algorithm

A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate?

X.509

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?

ciphertext-only

What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?

chosen-plaintext

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?

known plaintext

In what type of attack does the attacker need access to cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results?

chosen-chiphertext

What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?

brute force

When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing?

dictionary

What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher?

SSL/TLS downgrade attack

Which of the following is a scripting language for Windows and Linux that performs repetitive tasks, such as password cracking?

EXPECT

What application is considered the original password-cracking program and is now used by many government agencies to test for pasword strength?

L0phtcrack

Uses two keys: one to encrypt data and one to decrypt data

asymmetric algorythim

Encryption algorithm used for the Data Encryption Standard

DEA

Uses a single key to encrypt and decrypt data

symmetric algorithm

A digital document that verififes the two parties exchanging data over the internet are really who they claim to be

certificate

Used for verification, takes a variable-length input and converts it to a fixed-length output string

hashing algorithm

Used to find the same has value for two different inputs and reveal any mathematical weaknesses in a hashing algorithm

birthday attacks

Operate on plaintext one bit at a time

stream cipher

A structure consisting of programs, protocols, and security policies for encrypting data and uses public key cryptography to protect data transmitted over the internet

PKI

A sequence of random bits generated from a range of allowable values

key

The use of random data alongside plaintext as an input to a hashing function so that the output is unique

salt

Recommended textbook solutions

Java Programming

8th EditionJoyce Farrell

513 solutions

Java How to Program (Early Objects)

10th EditionHarvey M. Deitel, Paul J. Deitel

356 solutions

Data Structures and Algorithms in Java

6th EditionRoberto Tamassia

565 solutions

Starting Out with Python

2nd EditionTony Gaddis

601 solutions

Sets with similar terms

ITEC 472 Chapter 12

25 terms

DJFATWILL

ITEC 472 Entire Final

93 terms

DJFATWILL

Hands-On Ethical Hacking and Network Defense - Ch.…

45 terms

Justin_Crews

Ethical Hacking and Security - Chapter 12 - Crypto…

44 terms

harry_zee

Other sets by this creator

AP Gov Vocab

17 terms

JohnSAlloway

AP Computer Science Unit 2 Vocab

32 terms

JohnSAlloway

AP Literature Vocab

10 terms

JohnSAlloway

Test 4 Dates

17 terms

JohnSAlloway

Verified questions

COMPUTER SCIENCE

What value will be stored in the variable t after each of the following statements executes?A) t = (12 > 1); _______ B) t = (2 < 0); C) t = (5 == (3 * 2)); D) t = (5 == 5); _______

Verified answer

COMPUTER SCIENCE

What derived class is named in the line below? class Pet : public Dog

Verified answer

COMPUTER SCIENCE

What is the purpose of using a “salt” along with the user-provided password? Where should the “salt” be stored, and how should it be used?

Verified answer

COMPUTER SCIENCE

Write a method called sumArray that accepts an array of floating point values and returns the sum of the values stored in the array.

Verified answer

Other Quizlet sets

AP Art History Slide Quiz #8

20 terms

Marwa_Aminzay

Biology Chapter 2 Questions

27 terms

BellaMac7

FCS Test 1 MIC Intro (Lecture 1)

87 terms

Lynley_Choate1

biology past paper corrections

27 terms

dihasya

Related questions

QUESTION

File Transfer Protocol (FTP) is a client-server protocol that enables the transfer of files between computers over a network.

2 answers

QUESTION

n. in an exit device, a mechanism used to temporarily disable the latch from locking

2 answers

QUESTION

How does a block cipher handle plaintext input?

15 answers

QUESTION

The problem of computer generated passwords is that the passwords are easy to guess.

2 answers

What is the most complex encryption algorithm?

The encryption method the scientists used to generate a problem to solve is called the RSA algorithm, named for its creators Ron Rivest, Adi Shamir, and Leonard Adleman. In this algorithm, two parties encrypt information by using an almost unfathomably big number made by multiplying two prime numbers together.

What are the 3 main types of cryptography algorithms?

Three types of cryptography: secret-key, public key, and hash function.

Which type of algorithms takes a variable length string or message and produces a fixed length message digest?

A one-way hash function, also known as a message digest, is a mathematical function that takes a variable-length input string and converts it into a fixed-length binary sequence that is computationally difficult to invert—that is, generate the original string from the hash.

What is the most used encryption algorithm?

Today, AES is the most widely used encryption algorithm — it's used in many applications, including:.
Wireless security,.
Processor security and file encryption,.
SSL/TLS protocol (website security),.
Wi-Fi security,.
Mobile app encryption,.
Most VPNs (virtual private network), etc..

Toplist

Neuester Beitrag

Stichworte