Chapter 2 Flashcards

1
Q

what are 2 requirements for symetric encryption

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what do cryptanalytic attacks rely on

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the most widly used encyption scheme

A

DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the difference between DES and triple DES

A

3DS just repeats the DES algorithim with 2 or 3 unique keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is this

A

block ciypher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is this

A

stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the 3 benefitis of message authentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what are these the requirements for

A

hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how is a digital signature made

A

created by encypteing hash code with private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is a digital signature used for

A

authenticating both source and data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what does a digitial envelope do

A

protects a message without needeing to first arrange for sender and reciever to have the same secret key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly