Ch7 Flashcards

1
Q

What is the largest of the four variables in RSA cryptography

A

n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what attack demonstrated that 2DES took the same computational power as DES to defeat

A

meet-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what relies on the difficulty of factoring super-increasing sets and has been broken by cryptanalysis

A

Knapsack algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are fundamentals of Hash functions

A
  • must allow input of any length
  • fixed length output
  • easy to compute
  • one-way functionality
  • collision free
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

hashing algorithms

A

SHA-1 160 bit message digest

SHA-2 variable up to 512 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

how do cryptographic salts improve security

A

adding salts to passwords before hashing reduces the effectiveness of rainbow table attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how are digital signatures generated and verified

A
  • use hashing function to generate message digest
  • encrypt MD using your privkey
    to verify…
  • decrypt signature using public key of sender
  • compare MD to one you generate yourself, if they match the message is authentic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are the components of the Digital Signature Standard

A

-uses SHA-1 & SHA-2 along with one of the three encryption algorithms (DSA, RSA or ECDSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the standard for securing web traffic

A

HTTP over TLS …not SSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

name the attack that finds collisions in hash functions

A

birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

name attack that reuses authentication requests

A

replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

attacker has a copy of the encrypted message along with the plaintext message used to generate the ciphertext

A

known plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

attacker has the ability to decrypt chosen portions of the ciphertext message and use the decrypted portion of the message to discover the key.

A

chosen ciphertext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

attacker has the ability to encrypt plaintext messages of their choosing and can then analyze the ciphertext output of the encryption algorithm

A

chosen plaintext attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly