Chapter 10 Understanding Cryptography and PKI Flashcards
______ provides assurances that data has not been modified. Hashing ensures that data has retained integrity.
Integrity
A ____ is a number derived from performing a calculation on data, such as a message, patch, or file.
Hash
_______ creates a fixed-size string of bits or hexadecimal characters, which cannot be reversed to re-create the original data.
Hashing
Common hashing algorithms include ___ and ______ ____ ________.
MD5 and Secure Hash Algorithm (SHA)
_________ ensures that data is only viewable by authorized users.
Confidentiality
_______ protects the confidentiality of data.
Encryption
_______ scrambles, or ciphers, data to make it unreadable if intercepted.
Encryption
_______ normally includes an algorithm and a key.
Encryption
_______ _________ uses the same key to encrypt and decrypt data.
Symmetric encryption
_________ _________ uses two keys (public and private) created as a matched pair.
Asymmetric encryption
_________ _________ requires a Public Key Infrastructure (PKI) to issue certificates.
Asymmetric encryption
True or False: Anything encrypted with the public key can only be decrypted with the matching private key.
True
True or False: Anything encrypted with the private key can only be decrypted with the matching public key.
True
_____ ______ encrypt data 1 bit at a time.
Stream ciphers
_____ _______ encrypt data in blocks.
Block ciphers
___________ provides a level of confidentiality by hiding data within other files.
Steganography
A ______ _______ provides authentication, non-repudiation, and integrity.
Digital signature
__________ validates an identity.
Authentication
____________ prevents a party from denying an action.
Non-repudiation
True or False : Users sign emails with a digital signature, which is a hash of an email message encrypted with the sender’s private key.
True
True or False : Only the sender’s public key can decrypt the hash, providing verification it was encrypted with the sender’s private key.
True
True or False : No matter how many times you execute the hashing algorithm against the data, the hash will always be the same if the data is the same.
True
_______ _______ is a common hashing algorithm that produces a 128-bithash.
Message Digest 5 (MD5)
True or False : Although, security experts now consider MD5 cracked and discourage its use, it is still widely used to verify the integrity of files. This includes email, files stored on disks, files downloaded from the Internet, executable files, and more.
True