Encryption Flashcards
__________ is how information is concealed into a code so that the data is hidden and the true meaning of the information cannot be determined unless you have access to or are familiar with what the key is.
Encryption
The science of encrypting and encrypting information is called_________.
Cryptography
In order for encryption to actually work it has to contain a variable, which in encryption is the key.
True
False
True
Encryption is only able to protect data at rest or stored data. It cannot protect data while in transit.
True
False
False: It can protect during trasmission
This principle is ensuring sensitive information remains private unless given to another with explicit consent.
Authentication
Integrity
Confidentiality
Non repudiation
Confidentiality
This is used to verify the origin of the message.
Authentication
Integrity
Confidentiality
Non repudiation
Authentication
This is used to prove the contents of a message have not been changed since it was sent.
Authentication
Integrity
Confidentiality
Non repudiation
Integrity
What prevents the sender from denying they sent an encrypted message?
Non-repudiation
What are the two different types of keys?
Symmetric, Asymmetric
When using Stream Algorithms, set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.
True
False
False: Block Cipher
What are the two main types of Symmetric algorithms?
Format: Algorithm1, Algorithm2
Block and Stream
Before the DES process even starts, every 6th bit of the key is discarded to produce a 56-bit key.
True
False
False: Produces a 64 bit key discarding every 8th bit
The Blowfish Encryption Algorithm was developed as an alternative for DES. Being asymmetric, it uses a separate key for both encryption and decryption.
True
False
True
What algorithm is the most widely used encryption standard in use today?
DES
Blowfish Algorithm
AES
None of the above
AES
What algorithm is a block cypher that encrypts data in 64 bit blocks, and utilizes a key size that varies in length?
Blowfish Algorithm
DES
AES
None of the above
Blowfish Algorithm