ch 13 Encryption and Hashing Concepts Flashcards

1
Q

LANMAN hash ,

A

store Windows passwords

disabled on operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

birthday attack

A

n attack on a hashing
system that attempts to send two different messages with the same hash function,
causing a collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MD5 Hash

A

128-bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SHA-1

SHA-2

A

160-bit hash,
s 256-
bit and 512-bit block sizes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

RSA Public and Private Key Usage

A

Table 13-4 Summary of RSA Public and Private Key Usage
Task Which person’s key to use What kind of key
Send an encrypted message Receiver’s Public key
Decrypt an encrypted message Receiver’s Private key
Send an encrypted signature Sender’s Private key
Decrypt an encrypted signature Sender’s Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Summary of Symmetric Algorithms

A

DES Data Encryption Standard 56-bit
3DES Triple DES 168-bit
AES Advanced Encryption
Standard
256-bit
RC4 Rivest Cipher version 4 128-bit typical
RC5 Rivest Cipher version 5 64-bit typical
RC6 Rivest Cipher version 6 256-bit typical
Twofish Twofish 128-, 192-, 256-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric key algorithms

A

different keys to encrypt and decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

symmetric key algorithms:

A

A stream cipher is a type of algorithm that encrypts each binary digit in the
data stream, one bit at a time.
■ A block cipher is a type of algorithm that encrypts a group of bits collectively
as individual units known as blocks. For example, the Advanced Encryption
Standard (AES) algorithm can use 128-bit or 256-bit block ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ASE encryption

A

AES-128, AES-192,
and AES-256. Actually, each of these has the same 128-bit cipher block size, but the
key sizes for each are 128-bit, 192-bit, and 256-bit, respectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Steganography

A
the science (and art) of writing hidden messages; it is a form of security through
obscurity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

cipher

A

algorithm that can perform encryption or decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cryptography

A

hiding the meaning of the information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly