Chapter 7 PKI and Cryptographic Applications Flashcards
disadvantage—the algorithm doubles the length of any message it encrypts.
El Gamal
SHA-1 produces a ____-bit message digest.
and processes a message in ___-bit blocks.
160 , 512
SHA-256 produces a ___-bit message digest using a ___-bit block size.
256, 512
SHA-224 uses a truncated version of the SHA-256 hash to produce a __-bit message digest using a ___-bit block size.
224, 512
SHA-512 produces a ___-bit message digest using a ____-bit block size.
512, 1024
SHA-384 uses a truncated version of the SHA-512 hash to produce a ___-bit digest
using a ____-bit block size.
384 , 1024
MD2 pads the message so that its length is a multiple of __ bytes
16
MD2 generates a ___-bit message.
128
______ computes a 16-byte checksum and appends it to the end of the message.
MD2
__ pads the message to ensure that the message length is 64 bits smaller than a multiple of 512 bits.
MD4 , MD5
MD4 algorithm then processes ___-bit blocks of the message in three rounds of computation. The final output is a ____-bit message digest.
512, 128
Difference between MD4 and MD5 is that MD4 uses 3 rounds MD5 uses rounds.
true
Digital Signature Standard consists of which encryption algorithms ?
The Digital Signature Algorithm (DSA)
The Rivest, Shamir, Adleman (RSA)
The Elliptic Curve DSA (ECDSA)
Steganographic algorithms work by making alterations to the _____ significant bits of the many bits that make up image files.
least
protects entire communications circuits by creating a secure tunnel between two points using either a hardware solution or a software solution that encrypts all traffic entering one end of the tunnel and decrypts all traffic entering the other end of the tunnel.
End-to-end encryption
Link encryption
Link encryption
does not encrypt the header, trailer, address, and routing data, so it moves faster from point to point but is more susceptible to sniffers and eavesdroppers.
End-to-end encryption
Link encryption
End-to-end encryption
IPsec relies on security associations, and
there are two main components:
The Authentication Header (AH
The Encapsulating Security Payload (ESP)
IPsec provides for two discrete modes of operation _____ and _________
transport mode and tunnel mode
_____ mode , the entire packet, including the header, is encrypted.
tunnel mode
only the packet payload is encrypted.
transport mode
When encryption happens at the higher OSI layers, it is usually ______ encryption,
end-to-end
if encryption is done at the lower layers of the OSI model, it is usually ____ encryption
link
The attacker responds to the originator’s initialization requests and sets up a
secure session with the originator. The attacker then establishes a second secure session with the
intended recipient using a different key and posing as the originator.
Analytic Attack
Implementation Attack
Statistical Attack
Brute Force
Frequency Analysis and the Ciphertext Only Attack
Known Plaintext
Chosen Ciphertext
Chosen Plaintext
Meet in the Middle
Man in the Middle
Replay
Man in the Middle
the attacker uses a known plaintext message. The
plain text is then encrypted using every possible key (k1), and the equivalent ciphertext is decrypted using all possible keys (k2). When a match is found, the corresponding pair (k1,
k2) represents both portions of the double encryption
Analytic Attack
Implementation Attack
Statistical Attack
Brute Force
Frequency Analysis and the Ciphertext Only Attack
Known Plaintext
Chosen Ciphertext
Chosen Plaintext
Meet in the Middle
Man in the Middle
Replay
Meet in the Middle