Encryption PEs Flashcards
Which of the following is the closest example of a cipher text?
bWFuIGJlYXIgcGln
Data fed into an encryption fucnction will administer a series of steps called an algorithm on the data to produce a file in plaintext that relies on a key to reverse it.
False
What algorithm is a block cypher that encrypts data in 64 bit blocks, and utilizes a key size that varies in length?
Blowfish Algorithm
What algorithm is the most widely used encryption standard in use today?
AES
This CIA Triad pillar is what prevents the sender from denying they sent an encrypted message.
Non-Repudiation
The science of encrypting and decrypting information is called_________.
Cryptography
In order for encryption to actually work it has to contain a variable, which in encryption is the key and a set of actions (Algorithm) to manipulate the data.
True
__________ is how information is concealed into a code so that the data is visible and the true meaning of the information cannot be determined unless you have access to or are familiar with what the key is.
UNKNOWN
This is used to prove the contents of a message have not been changed since it was sent.
Integrity
What type of encryption uses both a private and a public key?
Asymmetric
This principle is ensuring sensitive information remains private unless given to another with explicit consent.
Confidentiality
When using Stream Algorithms, set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.
False
Whenever trying to verify the user who wants to get access to a system
Authentication
The cryptographic hash function is a 2-way function.
False
Encryption is only able to protect data at rest or stored data. It cannot protect data while in transit.
False
The Blowfish Encryption Algorithm was developed as an alternative for DES. Being asymmetric, it uses a separate key for both encryption and decryption.
False
SSL and TLS utilize what type/s of encryption?
A combination of asymmetric and symmetric encryption
Symmetric encryption consists of _______ key/s for encryption and decryption.
1
Which encryption method does NOT use a symmetric key?
RSA
What are the two different types of encryption?
Asymmetric, Symmetric
MD5 hashes are _____ bits in length and show their _____ digit hexadecimal value equivalent.
128, 32
While MD5 is useful, it is not extremely robust or secure making it good for file verification but not good for things that need to be highly secured.
False
Before the DES process even starts, every 6th bit of the key is discarded to produce a 56-bit key.
False, It discards every 8th bit
What are the two main types of Symmetric algorithms?
Block Algorithms, Streams Algorithms