Cryptography, Encryption, Hashes Flashcards

1
Q

Symmetric encryption is used primarily to provide confidentiality.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two of the most important applications of public-key encryption are digital signatures and key management.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The secret key is one of the inputs to a symmetric-key encryption algorithm.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The strength of a hash function against brute-force attacks depends on the length of the hash code produced by the algorithm.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public-key algorithms are based on simple operations on bit patterns. (T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On average, ________ of all possible keys must be tried in order to achieve success with a brute-force attack.

A

half

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to ________ .

A

use longer keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

A

Message authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The purpose of a ________ is to produce a ?fingerprint? of a file, message, or other block of data.

A

hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A _________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.

A

digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Symmetric encryption is also referred to as secret-key or single-key encryption.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ciphertext-only attack is the easiest to defend against.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.(T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AES uses a Feistel structure.(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Each block of 64 plaintext bits is encoded independently using the same key? is a description of the CBC mode of operation.(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Timing attacks are only applicable to RSA.(T/F)

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Using PKCS (public-key cryptography standard), when RSA encrypts the same message twice, different ciphertexts will be produced.(T/F)

18
Q

The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithms.(T/F)

19
Q

A key exchange protocol is vulnerable to a man-in-the-middle attack if it does not authenticate the participants.(T/F)

20
Q

Just like RSA can be used for signature as well as encryption, Digital Signature Standard can also be used for encryption.(T/F)

21
Q

In general, public key based encryption is much slower than symmetric key based encryption. (T/F)

22
Q

________ is the original message or data that is fed into the encryption process as input.

23
Q

Which of the following would allow an attack that to know the (plaintext of) current message must be the same as one previously transmitted because their ciphtertexts are the same?

24
Q

________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key.

A

Key distribution technique

25
Q

Which of the following feature can only be provided by public-key cryptography?

A

Non-repudiation

26
Q

Cryptographic systems are generically classified by _______.

A

A. the type of operations used for transforming plaintext to ciphertext

B. the number of keys used

C. the way in which the plaintext is processed

27
Q

________ attacks have several approaches, all equivalent in effort to factoring the product of two primes.

A

Mathematical

28
Q

________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number.

A

Timing attacks

29
Q

_________ was the first published public-key algorithm.

A

Diffie-Hellman

30
Q

The principal attraction of ________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead.

31
Q

SHA is perhaps the most widely used family of hash functions.(T/F)

32
Q

SHA-1 is considered to be very secure.(T/F)

33
Q

HMAC can be proven secure provided that the embedded hash function has some reasonable cryptographic strengths.(T/F)

34
Q

The additive constant numbers used in SHA-512 are random-looking and are hardcoded in the algorithm.(T/F)

35
Q

The strong collision resistance property subsumes the weak collision resistance property.(T/F)

36
Q

Cryptographic hash functions generally execute faster in software than conventional encryption algorithms such as DES and AES.(T/F)

37
Q

A hash function such as SHA-1 was not designed for use as a MAC and cannot be used directly for that purpose because it does not rely on a secret key.(T/F)

38
Q

It is a good idea to use sequentially increasing numbers as challenges in security protocols.(T/F)

39
Q

Assuming that Alice and Bob have each other?s public key. In order to establish a shared session key, Alice just needs to generate a random k, encrypt k using Bob?s public key, and send the encrypted k to Bob and then Bob will know he has a key shared with Alice. (T/F)

40
Q

SHA-1 produces a hash value of _______ bits.

41
Q

The DSS makes use of the _______ and presents a new digital signature technique, the Digital Signature Algorithm (DSA).