Cryptography, Encryption, Hashes Flashcards
Symmetric encryption is used primarily to provide confidentiality.(T/F)
True
Two of the most important applications of public-key encryption are digital signatures and key management.(T/F)
True
The secret key is one of the inputs to a symmetric-key encryption algorithm.(T/F)
True
The strength of a hash function against brute-force attacks depends on the length of the hash code produced by the algorithm.(T/F)
True
Public-key algorithms are based on simple operations on bit patterns. (T/F)
False
On average, ________ of all possible keys must be tried in order to achieve success with a brute-force attack.
half
If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to ________ .
use longer keys
________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.
Message authentication
The purpose of a ________ is to produce a ?fingerprint? of a file, message, or other block of data.
hash function
A _________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.
digital signature
Symmetric encryption is also referred to as secret-key or single-key encryption.(T/F)
True
The ciphertext-only attack is the easiest to defend against.(T/F)
True
A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.(T/F)
True
AES uses a Feistel structure.(T/F)
False
Each block of 64 plaintext bits is encoded independently using the same key? is a description of the CBC mode of operation.(T/F)
False
Timing attacks are only applicable to RSA.(T/F)
False