5.3 Flashcards

1
Q

A __________ is an unauthorized listener(spy).

A

eavesdropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An _______ in the context of encyption, the mathematical formula used to scramble and unscramble data.

A

algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ______ is a value that is used to encrypt or decrypt a message.

A

value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

T or F: A key can include numeric and alphanumeric text and special symbols.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ________ is restoring the original plain text from the cipher text.

A

decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_________ is the process of converting plain text to cipher text.

A

encyption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______ is the process of coding information into a form that is unreadable.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

________ is an algorithm for transforming plain text to cipher text.

A

cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ is the coded message (or) a non-readable form of the original text.

A

cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______ is the original message (or) an original readable textual material message or data.

A

plain text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___________ is the study of methods used to transmit information securely between two or more participants, so that it is unreadable by unauthorized users.

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

T or F: Cryptography is an essential tool to achieve the basic goals of Information Security.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_________ is the science of breaking cipher texts without the knowledge of the key.

A

cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

cryptography and cryptanalysis are known as _________.

A

cryptology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption and decryption, Hash functions, Digital Signatures, and Digital Certificates (digital IDs) are some of the popular _____________.

A

cryptographic mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T or F: The conversion and subsequent recovery of the data depend on a code or a key, which can be a number or a string of characters.

A

true

17
Q

Encryption is a cryptographic mechanism that helps to achieve the security service __________, whether the information is in storage or in transit.

A

confidentiality

18
Q

T or F: The fundemental requirement of Encryption is that no information is lost (all operation are reversible).

A

true

19
Q

What are two basic techniques for encryption?

A

substitution ciphers, and transposition ciphers.

20
Q

In ________ ciphers, each element in the plain text (bit, letter, group of bits or letters) is mapped into another element.

A

subsitution

21
Q

In ________ ciphers, elements in the plain text are rearranged or plain text characters are shifted in some regular pattern to form cipher text.

A

transposition

22
Q

the security of the data is totally dependent on two things: the strength of the _________ and the secrecy of the ______.

A

cryptographic algorithms, key.

23
Q

What are the two types of cryptograhic algorithms?

A

Asymmetric cryptography, and Symmetric cryptography.

24
Q

In __________ algothrithms, we use the same key to encrypt and decrypt the data.

A

Symmetric

25
Q

T or F: In symmetric algorithms, the sender and receiver must have the same key in order to share confidential information.

A

true

26
Q

What are the two challenges(problems) that come with a symmetric key cryptography?

A

distribution of key, authenticity.

27
Q

In _______ cryptography, two different keys are used for encryption and decryption of data.

A

asymmetric key

28
Q

What are the two keys used in asymmetric cryptography?

A

there is a public key and a private key.

29
Q

asymmetric key cryptography is also known as ________.

A

public key cryptography.

30
Q

In Asymmetric Key Cryptography, the ______ key is used to decrypt the data.

A

private

31
Q

T or F: In asymmetric cryptography, the private key is kep secret at all times, but the public key may be freely distributed.

A

true