5.4 Flashcards

1
Q

_________ is a cryptographic mechanism that helps to achieve the security service Data integrity.

A

Hash Function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

______ is values returned by a hash function.

A

Message Digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_________ is a signature in digital form for an electronic document.

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_______ is a trusted entity that handles digital certificate.

A

Certificate Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

T or F: Hash functions are hard to compute but easy to reverse.

A

false, easy to compute but hard to reverse.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A hash function __, applied on input (_), returns a fixed string ___.

A

H( ), (x), hs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How are Hash function mathematically written?

A

hs = H(x)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

T or F: the hashes can be sent with the message.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A ________ is a one-way mathematical function that generates a fixed-length hash value based on the plain text.

A

Hash Function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the main security services achieved through cryptography?

A

confidentiality, integrity, and non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T or F: Encryption is one of the core cryptographic mechanisms.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cryptographic mechanisms such as ________ and hash functions are used to ensure the security service integrity.

A

digital signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital Certificates (Digital IDs) are used to achieve the access control component ________.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the security service ________ prevents the sender from denying that he or she sent the message.

A

non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

T or F: Digital signatures achieve the security service Non-redpudiation.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The advantage of having a certificate is that is allows us to verify that a key (_____) is truly associated with a particular individual.

A

public key

17
Q

Verisign is a well-known ____.

A

CA

18
Q

A _______ is typically formed by taking a key (public key) and identifying information and have them signed by a CA.

A

digital certificate

19
Q

In Digital Signatures, A public key is used for (encyption/decryption)

A

decryption