Chapter 3 _part 2 or Quiz Flashcards

1
Q

if a key is 43 bits long, how much longer will it take to crack it by brute force if it is extended to 50 bits?

A

128 times as long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3DES characteristics?

A

very slow, strong enough for corporations and expensive in processing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is the security guarantee that people who intercept messages can not read them

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is transmitted across a network?

A

the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

describe RC4

A

extremely fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is the effective key length for 3DES

A

112 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

the 56-bit key size is sufficient for most _______ applications

A

consumer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

someone who breaks encryption is called?

A

cryptanalyst

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ is the use of mathematical operations to protect messages traveling between parties or stored on a computer

A

cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

nearly all encryption for confidentiality uses ___ encryption ciphers

A

symmetric key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what describes RC4?

A

RC4 can use a broad range of key lengths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a key length offered by AES?

A

192 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ____ is a random string of 40-4,000 bits used to encrypt messages

A

key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a DES key is ______ bits long

A

56

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ______ is a mathematical process used in encryption and decryption

A

cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

______ is efficient enough in processing power and RAM requirements to be used on small devices, such as PDAs and cell phones

A

AES

17
Q

_____ is an effective key length in 3DES

A

neither 40 or 110 bits

18
Q

____ ciphers leave letters in their original positions

A

substitution