Chapter 5 Flashcards
On what principle did Julius Caesar’s cyptographic messages function?
Question options:
Each alphabetic letter was replaced by a corresponding number
Each alphabetic letter was represented by a seemingly random symbol
Each alphabetic letter was shifted three places down in the alphabet
Each alphabetic letter was shifted 5 places up in the alphabet.
Each alphabetic letter was shifted three places down in the alphabet
Data that is in an unencrypted form is referred to as which of the following?
Question options:
Plaintext
Plain text
Simpletext
Cleartext
Cleartext
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
Question options:
Confidentiality
Availability
Encryption
Integrity
Integrity
What type of cryptographic algorithm is considered to be a one-way algorithm, in that its content can't be used to reveal the original set of data? A) hash B) key C) digest D) block
hash
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:
Question options:
RSA
SHA1
MD5
MD2
MD2
If using the MD5 hashing algorithm, what is the length to which each message is padded?
Question options:
32 bits
64 bits
128 bits
512 bits
512 bits
What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?
Question options:
Twofish
Blowfish
Whirlpool
Rijndal
Whirlpool
In which type of encryption is the same key used to encrypt and decrypt data? A) private B) public C) symmetric D) asymmetric
A) private
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
Question options:
shift
substitution
lock
loop
substitution
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
Question options:
Substitution
Block
Loop
Sponge
Sponge
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
Question options:
AES
Twofish
3DES
RSA
3DES
Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES: A) AES B) 3DES C) RSA D) Twofish
AES
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?
Question options:
RSA
AES
Blowfish
3DES
Blowfish
What type of cryptography uses two keys instead of just one, generating both a private and a public key?
Question options:
Symmetric
Asymmetric
Shared
Open
Asymmetric
Which of the following is not one of the functions of a digital signature?
Question options:
Verification of the sender
Prevention of the sender from disowning the message
Prove the integrity of the message
Protect the public key
Protect the public key