When Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm which key does he use to encrypt the message?

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (20)

Which areas of a file cannot be used by steganography to hide data?

in the directory structure of the file system

Egor wanted to use a digital signature. Which of the following benefits will the digital signature not provide?

verify the receiver

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?

ROT13

What is the latest version of the Secure Hash Algorithm?

SHA-3

What is a characteristic of the Trusted Platform Module (TPM)?

It provides cryptographic services in hardware instead of software

Proving that a user sent an email message is known as _____.

non-repudiation

Which of these is the strongest symmetric cryptographic algorithm?

Advanced Encryption Standard

Which of the following key exchanges uses the same keys each time?

Diffie-Hellman (DH)

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

The Hashed Message Authentication Code (HMAC) _____.

hashes the key and the message

A(n) _____ is not decrypted but is only used for comparison purposes.

digest

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

plaintext

Illya was asked to recommend the most secure asymmetric cryptographic algorithm to his supervisor. Which of the following did he choose?

RSA

Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum?

0

Which of these is NOT a characteristic of a secure hash algorithm?

Collisions should be rare.

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

Hardware Security Module (HSM)

Which of these is NOT a basic security protection for information that cryptography can provide?

risk loss

At a staff meeting one of the technicians suggested that the enterprise protect its new web server by hiding it and not telling anyone where it is located. Iosif raised his hand and said that security through obscurity was a poor idea. Why did he say that?

It would be essentially impossible to keep its location a secret from everyone.

Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?

confusion

Public key systems that generate random public keys that are different for each session are called _____.

perfect forward secrecy

Recommended textbook solutions

When Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm which key does he use to encrypt the message?

Engineering Electromagnetics

8th EditionJohn Buck, William Hayt

483 solutions

When Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm which key does he use to encrypt the message?

Introduction to the Theory of Computation

3rd EditionMichael Sipser

389 solutions

When Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm which key does he use to encrypt the message?

C++ Programming: From Problem Analysis to Program Design

7th EditionD. S. Malik

835 solutions

When Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm which key does he use to encrypt the message?

Intro to Java Programming, Comprehensive Version

10th EditionY. Daniel Liang

1,626 solutions

Sets with similar terms

IS 477

40 terms

Paul_Lounello

Security Quiz 5

20 terms

cntgreg

Security+ Chapter 5 review questions

20 terms

Ryan_Framinan

Security+ Chapter 5 review questions

20 terms

Joy_PlatterTEACHER

Sets found in the same folder

Unit 14 quiz

20 terms

joel_boehme

Security+ Chapter 4

20 terms

Greg_DeLoach6

Intro to Network Security sixth ed chapter 5

42 terms

david_ellis43

Chapter 12

20 terms

ka3byz

Other sets by this creator

MATH 135 Exam

20 terms

Gh0stByte

MATH 135 - Test 3

17 terms

Gh0stByte

Physics 150 Exam 1

28 terms

Gh0stByte

Math 135 Exam 2

18 terms

Gh0stByte

Verified questions

COMPUTER SCIENCE

Design and implement a set of classes that keeps track of information about a set of people, such as age, nationality, occupation, income, and so on. Design each class to focus on a particular aspect of data collection. Create a main driver class to instantiate several of the classes.

Verified answer

COMPUTER SCIENCE

True/False. Polymorphism may occur with inheritance bur not with interfaces.

Verified answer

COMPUTER SCIENCE

If a picture was made up of 64 possible colors, how many bits would be needed to store each pixel of the picture? a. 4, b. 5, c. 6, d. 7, e. 8.

Verified answer

COMPUTER SCIENCE

Consider the hierarchical paging scheme used by the VAX architecture. How many memory operations are performed when a user program executes a memory-load operation?

Verified answer

Other Quizlet sets

Christian Families BFAM Rine

16 terms

mwetton

Neuro: Jeff Quiz 1

72 terms

SJLagasse

To Kill a Mockingbird Test Study Guide (Movie) 1CP…

37 terms

mehirschTEACHER

Module 2 Cancer and Genetics

81 terms

bronwyn_deforestPLUS

Related questions

QUESTION

What Windows Server 2016 feature provides the ability to find identical sets of data on a SAN-based storage array and reduce the identical sets to a single instance to reduce space?

15 answers

QUESTION

Which human resources policy is most likely to reveal a fraud by employees?

3 answers

QUESTION

Using what mechanism below can the non-repudiation of an e-mail and its content be enforced?

5 answers

QUESTION

Most browsers come equipped with SSL and most Web servers have implemented the protocol. True or False.

4 answers

Which key is used for asymmetric encryption?

Asymmetric encryption is also called public key encryption, but it actually relies on a key pair. Two mathematically related keys, one called the public key and another called the private key, are generated to be used together. The private key is never shared; it is kept secret and is used only by its owner.

When Alice encrypts a message using her private key before sending it to Bob What will Bob need to decrypt Alice's message?

If Bob wants to send Alice a secret message, he encrypts it with Alice's public key. Then no one but Alice can decrypt it. Only her private key can undo the encryption, and no one can figure out the private key from the public key.

Which cryptographic method should Susanne use to ensure that a document can be encrypted with a key and decrypted with a different key quizlet?

Use: Susan's public key (The message should be encrypted with Susan's key for her to decrypt and read with her private key). Use: Bob's private key. (Bob's private key is used to encrypt the hash. Most common asymmetric cryptography algorithm.

What is Alice's private key?

Alice has both a public key and a private key, so she keeps her private key in a safe place and sends her public key to Bob. Bob encrypts the secret message to Alice using Alice's public key. Alice can later decrypt the message with her private key.