is4560 T&D CHAPTER 3 Flashcards

1
Q
  • An algorithm that uses a pair of cryptographic keys to perform encryption/ decryption functions on information.

(FYI) These keys, and the algorithms that use them, have a unique property: If one key is used to perform an operation, its companion key is the only one that can reverse the operation. Additionally, if one key is viewed, it does not give insight into what the other key looks like because of the mathematics involved in the creation process. It is sometimes also referred to as using public and private keys, which describes who has access to and possession of the keys.

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • An effort to break something such as a password by using all possible combina- tions of characters until a combination works.
A

Brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • An attack in which a predefined list of words is tried to see whether one of them is a user’s password.
A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • The unique number produced by a hash algorithm when applied to a dataset. This value verifies the integrity of data.
A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • Encryption that uses the same key to encrypt and to decrypt information.
A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ is - Functions that are easy to compute in one direction, but hard to do in the other.

A

Trapdoor functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly