Chapter 5 Flashcards

1
Q

On what principle did Julius Caesar’s cyptographic messages function?

Question options:

Each alphabetic letter was replaced by a corresponding number

Each alphabetic letter was represented by a seemingly random symbol

Each alphabetic letter was shifted three places down in the alphabet

Each alphabetic letter was shifted 5 places up in the alphabet.

A

Each alphabetic letter was shifted three places down in the alphabet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data that is in an unencrypted form is referred to as which of the following?

Question options:

Plaintext

Plain text

Simpletext

Cleartext

A

Cleartext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

Question options:

Confidentiality

Availability

Encryption

Integrity

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
What type of cryptographic algorithm is considered to be a one-way algorithm, in that its content can't be used to reveal the original set of data?
A) hash
B) key
C) digest
D) block
A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

Question options:

RSA

SHA1

MD5

MD2

A

MD2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

If using the MD5 hashing algorithm, what is the length to which each message is padded?

Question options:

32 bits

64 bits

128 bits

512 bits

A

512 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?

Question options:

Twofish

Blowfish

Whirlpool

Rijndal

A

Whirlpool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
In which type of encryption is the same key used to encrypt and decrypt data?
A) private
B) public
C) symmetric
D) asymmetric
A

A) private

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

Question options:

shift

substitution

lock

loop

A

substitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

Question options:

Substitution

Block

Loop

Sponge

A

Sponge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

Question options:

AES

Twofish

3DES

RSA

A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:
A) AES
B) 3DES
C) RSA
D) Twofish
A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?

Question options:

RSA

AES

Blowfish

3DES

A

Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of cryptography uses two keys instead of just one, generating both a private and a public key?

Question options:

Symmetric

Asymmetric

Shared

Open

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is not one of the functions of a digital signature?

Question options:

Verification of the sender

Prevention of the sender from disowning the message

Prove the integrity of the message

Protect the public key

A

Protect the public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The asymmetric cryptography algorithm most commonly used is:

Question options:

AES

RSA

Twofish

Blowfish

A

RSA

17
Q

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

Question options:

FCC

RSA

ECC

IKE

A

ECC

18
Q

Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?

Question options:

Reactive cryptography

Symmetric cryptography

Analog cryptography

Quantum cryptography

A

Quantum cryptography

19
Q

The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

Question options:

matrix-based

lattice-based

linear

quantum

A

lattice-based

20
Q
What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?
A) GPG
B) OGP
C) CGP
D) GPP
A

A) GPG

21
Q

The SHA-1 hashing algorithm creates a digest that is how many bits in length?

Question options:

​96 bits

​128 bits

​160 bits

​192 bits

A

​160 bits