Chpt 6 Flashcards

1
Q

What are the 4 goals of cryptography?

A

Confidentiality
Integrity
Authentication
Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does this symbol mean in Boolean mathematics?

A

AND

Tests whether two values are both true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does this symbol mean in Boolean mathematics?

v

A

OR

This checks to see whether at least one of the input values is true.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does this symbol mean in Boolean mathematics?

~ or !

A

NOT

This simply reverses the value of an input variable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does this symbol mean in Boolean mathematics?

+ in a O

A

XOR or Exclusive OR

This returns the true value when only one of the input values is true.

I.e. if both values are false or both are true, the output of XOR is false (0).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Modulo function?

A

The remainder value left over after a division operation is performed.

Represented by %

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Work Function?

A

A measure of the strength of a cryptography system. A measure of the effort in terms of cost/time to perform a complete brute force attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Confusion in Cryptography

A

When the relationship between the plaintext and the key is so complicated that an attacker can’t merely continue to alter the plaintext and analyzing the ciphertext to determine the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Diffusion in Cryptography

A

When a small change in the plaintext results in a big change in the ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What the bit block size of AES?

A

128-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which ciphers often use a passage from a commonly available book as a key?

A

Running Key or Book Ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which algorithm uses prewhitening and postwhitening?

A

Twofish algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the equation for finding the number of keys needed in symmetric ciphers?

A

n(n-1) / 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What cannot be achieved by secret key cryptography?

A

Nonrepudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly