Chapter 6 Cryptography and Symmetric Key Algorithms Flashcards

1
Q

To encrypt a message, you simply shift each letter of the alphabet three places to the
right

A

Caesar cipher r .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a cryptographic system should be secure

even if everything about the system, except the key, is public knowledge.

A

The Kerchoff Principle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

random number that acts as a placeholder variable in mathematical functions.

A

nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Zero-Knowledge Proof

A

zero-knowledge proof

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When the information or privilege required to perform an operation is divided among
multiple users, no single person has suffi cient privileges to compromise the security
of an environment.

A

Split Knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a minimum number of agents out of the total number of agents work together to perform high-security tasks.

A

M of N Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

cryptographic systems of symbols that represent words or phrases,

A

Codes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

always meant to hide the true meaning of a message

A

Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

________ use an encryption algorithm to rearrange the letters of a plaintext message, forming the ciphertext message.

A

Transposition ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

use a different substitution alphabet for each letter of the plaintext message.

A

one-time pad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the encryption key is as long as the m r essage itself and is often
chosen from a common book

A

running key cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

the relationship between the plain text
and the key is so complicated that an attacker can’t merely continue altering the plain
text and analyzing the resulting ciphertext to determine the key.

A

Confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a change in the plain text results in multiple changes spread throughout the ciphertext.

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Advanced Encryption Standard (AES)

Block Size____ bits
Key Size _____ bits

A

Block Size - 128

Key size - 128, 192, 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Skipjack

Block Size____ bits
Key Size _____ bits

A

Block Size 64

Key size 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDEA (used in PGP)

Block Size____ bits
Key Size _____ bits

A

Block size 64

Key size 128

17
Q

Twofish

Block Size____ bits
Key Size _____ bits

A

Block size 128

Key size 1 - 256

18
Q

DES
Block Size____ bits
Key Size _____ bits

A

Block size 64

Key size 56

19
Q

Triple DES (3DES)
Block Size____ bits
Key Size _____ bits

A

Block size 64

Key size 168

20
Q

_______ was developed in response to complaints about the insufficient key length of the DES algorithm.

A

International Data Encryption Algorithm (IDEA)

21
Q

International Data Encryption Algorithm key is broken up in a series of operations into __ 16-bit subkeys.

A

52

22
Q

Which algorithm supports the escrow of encryption keys ?

Rijndael
Twofish
Skipjack
Blowfish

A

Skipjack

23
Q

Twofish uses two techniques not found in other algorithms

A

Prewhitening

Postwhitening

24
Q

Involves XORing the plain text with a separate subkey before the first round of encryption.

Prewhitening
Postwhitening

A

Prewhitening

25
Q

Involves XORing the plain text with a separate subkey after the 16th round of encryption.

A

Postwhitening

26
Q

Name the three main methods used to exchange secret keys securely.

A

Diffie-Hellman, Public Key Encryption, Offline Distribution

27
Q

Name two major approaches to key escrow that have been proposed over the past decade:

A

Fair Cryptosystems, Escrowed Encryption Standard

28
Q

In this escrow approach, the secret keys used in a communication are divided into two or more pieces, each of which is given to an independent third party.
Each of these pieces is useless on its own but may be recombined to obtain the secret key.

Fair Cryptosystems
Escrowed Encryption Standard

A

Fair Cryptosystems

29
Q

This escrow approach provides the government with a technological means to decrypt ciphertext. This standard is the basis behind the Skipjack algorithm.

Fair Cryptosystems
Escrowed Encryption Standard

A

Escrowed Encryption Standard

30
Q

Name 6 symmetric algorithms

A
Data Encryption Standard (DES)
Triple DES (3DES)
 International Data Encryption Algorithm (IDEA)
Blowfish
Skipjack,
Advanced Encryption Standard (AES).