Cryptography, Encryption, Hashes Flashcards

1
Q

Symmetric encryption is used primarily to provide confidentiality.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two of the most important applications of public-key encryption are digital signatures and key management.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The secret key is one of the inputs to a symmetric-key encryption algorithm.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The strength of a hash function against brute-force attacks depends on the length of the hash code produced by the algorithm.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public-key algorithms are based on simple operations on bit patterns. (T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On average, ________ of all possible keys must be tried in order to achieve success with a brute-force attack.

A

half

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to ________ .

A

use longer keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

A

Message authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The purpose of a ________ is to produce a ?fingerprint? of a file, message, or other block of data.

A

hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric encryption is also referred to as secret-key or single-key encryption.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ciphertext-only attack is the easiest to defend against.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES uses a Feistel structure.(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Each block of 64 plaintext bits is encoded independently using the same key? is a description of the CBC mode of operation.(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Timing attacks are only applicable to RSA.(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Using PKCS (public-key cryptography standard), when RSA encrypts the same message twice, different ciphertexts will be produced.(T/F)

A

True

18
Q

The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithms.(T/F)

A

True

19
Q

A key exchange protocol is vulnerable to a man-in-the-middle attack if it does not authenticate the participants.(T/F)

A

True

20
Q

Just like RSA can be used for signature as well as encryption, Digital Signature Standard can also be used for encryption.(T/F)

A

False

21
Q

In general, public key based encryption is much slower than symmetric key based encryption. (T/F)

A

True

22
Q

________ is the original message or data that is fed into the encryption process as input.

A

Plaintext

23
Q

Which of the following would allow an attack that to know the (plaintext of) current message must be the same as one previously transmitted because their ciphtertexts are the same?

A

ECB

24
Q

________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.

A

Key distribution technique

25
Q

Which of the following feature can only be provided by public-key cryptography?

A

Non-repudiation

26
Q

Cryptographic systems are generically classified by _______.

A

A. the type of operations used for transforming plaintext to ciphertext

B. the number of keys used

C. the way in which the plaintext is processed

27
Q

________ attacks have several approaches, all equivalent in effort to factoring the product of two primes.

A

Mathematical

28
Q

________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

A

Timing attacks

29
Q

_________ was the first published public-key algorithm.

A

Diffie-Hellman

30
Q

The principal attraction of ________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead.

A

ECC

31
Q

SHA is perhaps the most widely used family of hash functions.(T/F)

A

True

32
Q

SHA-1 is considered to be very secure.(T/F)

A

False

33
Q

HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths.(T/F)

A

True

34
Q

The additive constant numbers used in SHA-512 are random-looking and are hardcoded in the algorithm.(T/F)

A

True

35
Q

The strong collision resistance property subsumes the weak collision resistance property.(T/F)

A

True

36
Q

Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES and AES.(T/F)

A

True

37
Q

A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key.(T/F)

A

True

38
Q

It is a good idea to use sequentially increasing numbers as challenges in security protocols.(T/F)

A

False

39
Q

Assuming that Alice and Bob have each other?s public key. In order to establish a shared session key, Alice just needs to generate a random k, encrypt k using Bob?s public key, and send the encrypted k to Bob and then Bob will know he has a key shared with Alice. (T/F)

A

False

40
Q

SHA-1 produces a hash value of _______ bits.

A

160

41
Q

The DSS makes use of the _______ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).

A

SHA-1