Encryption 4.2 Flashcards

1
Q

Primarily used for transmitting digital signatures and key exchange.

A

El Gamal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It’s a document that describes in detail the organizational structure, responsible roles, and rules for key management

A

KMPS(key management practices statement)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Similar functions to RSA but with smaller key sizes(requires less computing power)

A

ECC(Elliptic Curve Cryptosystem)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

64-bit key/ 48 rounds of susitution and transposition using either 2 or 3 keys.
Consider to be deprecated.

A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

128 or 192 or 256 bit key/ 10 or 12 or 14 rounds of susitution and transposition.
U.S Government symmetric algorithm standard.

A

AES|Rijndael

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key used in asymmetric encryption. It is shared openly and can be distributed to anyone.

A

Public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Key used in asymmetric encryption. It is kept secret and should never be shared. Used to decrypt data that was encrypted.

A

Private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Piece of information or a value used in an algorithm to encrypt and decrypt data

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Process of converting plain text into ciphertext using a mathematical algorithm and a key. The main function is to protect the confidentiality of data, ensuring only authorized parties with the correct decryption key can access the original information

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stream cipher key sizes 40-2048 bits and has 4 variants.

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Uses Key pairs, operates on relatively small data blocks, is computationally intensive, is scalable for large user bases, and facilitates secure key exchange.

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Uses a single shared key for both encryption and decryption, can operate large data blocks, is computationally efficient, is not scalable, and its key exchange is inherently insecure.

A

Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Widely implemented defacto commercial standard. Works with both encryption and digital signatures.

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Primarily used for key agreement(key exchange). Allows two parties that have no prior knowledge of each other to jointly establish a shared secret key.

A

Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A symmetric key that’s used only once in a particular session.

A

Session Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly