Chapter 2 Flashcards
1
Q
what are 2 requirements for symetric encryption
A
2
Q
what do cryptanalytic attacks rely on
A
3
Q
what is the most widly used encyption scheme
A
DES
4
Q
what is the difference between DES and triple DES
A
3DS just repeats the DES algorithim with 2 or 3 unique keys
5
Q
what is this
A
block ciypher
6
Q
what is this
A
stream cipher
7
Q
what are the 3 benefitis of message authentication
A
8
Q
what are these the requirements for
A
hash function
9
Q
how is a digital signature made
A
created by encypteing hash code with private key
10
Q
what is a digital signature used for
A
authenticating both source and data integrity
11
Q
what does a digitial envelope do
A
protects a message without needeing to first arrange for sender and reciever to have the same secret key