chapter2 Flashcards

1
Q

Symmetric encryption is used primarily to provide confidentiality

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two of the most important applications of public-key encryption are
digital signatures and key management.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptanalytic attacks try every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The secret key is input to the encryption algorithm

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Triple DES takes a plaintext block of 64 bits and a key of 56 bits to
produce a ciphertext block of 64 bits.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modes of operation are the alternative techniques that have been
developed to increase the security of symmetric block encryption for large sequences of data.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The advantage of a stream cipher is that you can reuse keys.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A message authentication code is a small block of data generated by a
secret key and appended to a message.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Like the MAC, a hash function also takes a secret key as input.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The strength of a hash function against brute-force attacks depends
solely on the length of the hash code produced by the algorithm.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Public-key cryptography is asymmetric

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public-key algorithms are based on simple operations on bit patterns

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The purpose of the DSS algorithm is to enable two users to securely
reach agreement about a shared secret that can be used as a secret key
for subsequent symmetric encryption of messages

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An important element in many computer security services and
applications is the use of cryptographic algorithms.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Some form of protocol is needed for public-key distribution

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The original message or data that is fed into the algorithm is __________.
A. encryption algorithm B. secret key
C. decryption algorithm D. plaintext

A

plaintext

17
Q

The __________ is the encryption algorithm run in reverse.
A. decryption algorithm B. plaintext
C. ciphertext D. encryption algorithm

A

decryption algorithm

18
Q

__________ is the scrambled message produced as output.
A. Plaintext B. Ciphertext
C. Secret key D. Cryptanalysis

A

Ciphertext

19
Q

On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack.
A. one-fourth B. half
C. two-thirds D. three-fourths

A

half

20
Q

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.
A. SHA B. RSA
C. AES D. DSS

A

AES

21
Q

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ .
A. use longer keys B. use shorter keys
C. use more keys D. use less keys

A

use longer keys

22
Q

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.
A. Cryptanalysis B. Decryption
C. Message authentication D. Collision resistance

A

Message authentication

23
Q

The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data.
A. secret key B. digital signature
C. keystream D. hash function

A

hash function

24
Q

__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.
A. DSS B. RSA
C. SHA D. AES

A

RSA

25
Q

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
A. digital signature B. keystream
C. one way hash function D. secret key

A

digital signature

26
Q

Transmitted data stored locally are referred to as __________ .
A. ciphertext B. DES
C. data at rest D. ECC

A

data at rest

27
Q

Digital signatures and key management are the two most important applications of __________ encryption.
A. private-key B. public-key
C. preimage resistant D. advanced

A

public-key

28
Q

A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.
A. mode of operation B. hash function
C. cryptanalysis D. brute-force attack

A

brute-force attack

29
Q

Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator.
A. keystream B. digital signature
C. secure hash D. message authentication code

A

keystream

30
Q

A _________ protects against an attack in which one party generates a message for another party to sign.
A. data authenticator B. strong hash function
C. weak hash function D. digital signature

A

strong hash function