CH1 Flashcards
What type of attack is snooping
- Passive Attack
……. attack violate integrity by allowing attackers to impersonate legitimate entities
Masquerading
what is a Repudiation, What principle does it violate and what type of attack is it ?
- Repusiation is attcker denies having participated in that transaction or communication.
- Threat of integrity
- active attack
Name the security services :
- Data confidentiality
- Data integrity
- Nonrepudiation
- Authentication
- Access control
Which security services does encipherment refers to?
- Data Integrity
- Data Confidentiality
- Authentication
Which security services does Digital Signature refers to?
- Nonrepudiation
- Authentication
- Data integrity
What are the security mechanisms for Nonrepudiation?
- Data integrity
- Digital Signature
- notarization
Cryptology is a field both of?
Cryptography and cryptanalysis
What does cryptography solve?
- Confidentiality, integrity, availability, identity and non-repudiation
what are some examples of symmetric encryption?
- DES (Data Encryption Standard)
- AES(Advanced Encryption Standard)
what are two examples of Substitution Cipher?
- Caesar cipher
- Atbash cipher
Messages encrypted with the private key can
only be decrypted with the public key.
Asymmetric Digital Signature
which one is slower:
- Asymmetric-Key
- Symmetric-Key
Asymmetric-Key
why does is the Asymmetric key slower than the symmetric key?
because the key is longer.