Chapter 07: Cryptography and the Public Key Infrastructure Flashcards
Which of the following is a Cryptography goal (select all that apply)?
a. Confidentiality
b. Integrity
c. Availability
d. Denial
a. Confidentiality
b. Integrity
Which of the following is not a cryptography goal?
a. Confidentiality
b. Availability
c. Nonpedudiation
d. Authentication
b. Availability
A ______ is a method used to scramble or obfuscate characters to hide their value.
Cipher
Name two primary types of nonmathematical cryptography.
Transposition and Substitution.
A ________ is a type of coding or ciphering system that changes one character or symbol into another.
Substitution cipher
A _______ has multiple substitution alphabets for the same message.
Polyalphabetic substitution ciphers
Which category does Vigenere cipher fit?
Polyalphabetic Substitution
Which category does Caesar cipher fit?
Substitution Cipher
Which category does Columnar cipher fit?
Transposition Cipher
A _____ involves scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size and then scrambled.
Transposition cipher
The ________ was created by the German government during WW2 to provide secure communications between military and political units.
Enigma Machine
_______ is the art of using cryptographic techniques to embed secret messages within another file.
Steganography
______ use a shared secret key available to all users of the cryptosystem.
Symmetric Cryptosystems
_____ uses individual combinations of public/private keys for each user of the system.
Asymmetric Cryptosystems
How does obfuscation differ from confidentiality?
Obfuscation is the practice of making it intentionally difficult for humans to understand how code works.