chapter2 Flashcards
Symmetric encryption is used primarily to provide confidentiality
T
Two of the most important applications of public-key encryption are
digital signatures and key management.
T
Cryptanalytic attacks try every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained.
F
The secret key is input to the encryption algorithm
T
Triple DES takes a plaintext block of 64 bits and a key of 56 bits to
produce a ciphertext block of 64 bits.
F
Modes of operation are the alternative techniques that have been
developed to increase the security of symmetric block encryption for large sequences of data.
T
The advantage of a stream cipher is that you can reuse keys.
F
A message authentication code is a small block of data generated by a
secret key and appended to a message.
T
Like the MAC, a hash function also takes a secret key as input.
F
The strength of a hash function against brute-force attacks depends
solely on the length of the hash code produced by the algorithm.
T
Public-key cryptography is asymmetric
T
Public-key algorithms are based on simple operations on bit patterns
F
The purpose of the DSS algorithm is to enable two users to securely
reach agreement about a shared secret that can be used as a secret key
for subsequent symmetric encryption of messages
F
An important element in many computer security services and
applications is the use of cryptographic algorithms.
T
Some form of protocol is needed for public-key distribution
T