Cryptography Terms (Ch. 8) Flashcards

1
Q

Cryptographic algorithms that use two different keys, one key to encrypt and another to decrypt. Also called public key cryptography.

A

asymmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An authentication protocol that periodically reauthenticates.

A

Challenge Handshake Authentication Protocol (CHAP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When two different inputs into a cryptographic hash produce the same output, this is known as a __________.

A

collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A function that is one-way (nonreversible), has a fixed length output, and is collision resistant.

A

cryptographic hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

an algorithm used to generate a number that is sufficiently random for cryptographic purposes.

A

pseudo-random number generator (PRNG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A table of precomputed hashes used to guess passwords by searching for the hash of a password.

A

rainbow table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Bits added to a hash to make it resistant to rainbow table attacks.

A

salt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Any cryptographic algorithm that uses the same key to encrypt and decrypt. DES, AES, and Blowfish are examples.

A

symmetric cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

this standard is the most widely used standard for digital certificates.

A

X.509

How well did you know this?
1
Not at all
2
3
4
5
Perfectly