Chapter 7 PKI and Cryptographic Applications Flashcards
disadvantage—the algorithm doubles the length of any message it encrypts.
El Gamal
SHA-1 produces a ____-bit message digest.
and processes a message in ___-bit blocks.
160 , 512
SHA-256 produces a ___-bit message digest using a ___-bit block size.
256, 512
SHA-224 uses a truncated version of the SHA-256 hash to produce a __-bit message digest using a ___-bit block size.
224, 512
SHA-512 produces a ___-bit message digest using a ____-bit block size.
512, 1024
SHA-384 uses a truncated version of the SHA-512 hash to produce a ___-bit digest
using a ____-bit block size.
384 , 1024
MD2 pads the message so that its length is a multiple of __ bytes
16
MD2 generates a ___-bit message.
128
______ computes a 16-byte checksum and appends it to the end of the message.
MD2
__ pads the message to ensure that the message length is 64 bits smaller than a multiple of 512 bits.
MD4 , MD5
MD4 algorithm then processes ___-bit blocks of the message in three rounds of computation. The final output is a ____-bit message digest.
512, 128
Difference between MD4 and MD5 is that MD4 uses 3 rounds MD5 uses rounds.
true
Digital Signature Standard consists of which encryption algorithms ?
The Digital Signature Algorithm (DSA)
The Rivest, Shamir, Adleman (RSA)
The Elliptic Curve DSA (ECDSA)
Steganographic algorithms work by making alterations to the _____ significant bits of the many bits that make up image files.
least
protects entire communications circuits by creating a secure tunnel between two points using either a hardware solution or a software solution that encrypts all traffic entering one end of the tunnel and decrypts all traffic entering the other end of the tunnel.
End-to-end encryption
Link encryption
Link encryption
does not encrypt the header, trailer, address, and routing data, so it moves faster from point to point but is more susceptible to sniffers and eavesdroppers.
End-to-end encryption
Link encryption
End-to-end encryption