J04: Encryption (PE) Flashcards
__________ is how information is concealed into a code so that the data is hidden and the true meaning of the information cannot be determined unless you have access to or are familiar with what the key is.
encryption
The science of encrypting and encrypting information is called_________.
cryptography
In order for encryption to actually work it has to contain a variable, which in encryption is the key.
- True
- False
True
Encryption is only able to protect data at rest or stored data. It cannot protect data while in transit.
- True
- False
False
This principle is ensuring sensitive information remains private unless given to another with explicit consent.
- Authentication
- Integrity
- Confidentiality
- Non repudiation
Confidentiality ?
This is used to verify the origin of the message.
- Authentication
- Integrity
- Confidentiality
- Non repudiation
Authentication
This is used to prove the contents of a message have not been changed since it was sent.
- Authentication
- Integrity
- Confidentiality
- Non repudiation
intergrity
What prevents the sender from denying they sent an encrypted message?
non repudiation
What are two different types of keys?
symmetric & asymmetric ?
When using Stream Algorithms, set lengths of bits are encrypted in blocks of electronic data with the use of a specific secret key. As the data is being encrypted, the system holds the data in its memory as it waits for complete blocks.
- True
- False
False
What are the two main types of Symmetric algorithms?
Format: Algorithm1, Algorithm2
block, steam ?
Before the DES process even starts, every 6th bit of the key is discarded to produce a 56-bit key.
- True
- False
False (ever 8th bit)
The Blowfish Encryption Algorithm was developed as an alternative for DES. Being asymmetric, it uses a separate key for both encryption and decryption.
- True
- False
True
What algorithm is the most widely used encryption standard in use today?
- DES
- Blowfish Algorithm
- AES
- None of the above
AES
What algorithm is a block cypher that encrypts data in 64 bit blocks, and utilizes a key size that varies in length?
- Blowfish Algorithm
- DES
- AES
- None of the above
Blowfish Algorithm
While MD5 is useful, it is not extremely robust or secure making it good for file verification but not good for things that need to be highly secured.
- True
- False
True
Fill in the blank: MD5 hashes are _____ bits in length and show their _____ digit hexadecimal value equivalent.
128, 32
Which encryption method does NOT use a symmetric key?
- AES
- RSA
- DES
- Blowfish Algorithm
RSA
What type of encryption uses both a private and a public key?
- Asymmetric
- Symmetric
- DES
- None of the above
Asymmetric
SSL and TLS utilize what type/s of encryption?
- A combination of asymmetric and symmetric encryption
- Specialized key encryption
- PKI Certificate Encryption
- Mathematically comparable keys
A combination of asymmetric and symmetric encryption
When visiting an HTTPS website, your browser establishes an ____________ encrypted connection.
asymmetric
When used with wireless LAN, MD5 is vulnerable to password exposure?
- True
- False
True
A message digest is encrypted the with sender’s private key, this digest is referred to as a digital signature. The receiver of this message can decrypt it using the receiver’s private key.
- True
- False
False
The cryptographic hash function is a 2-way function.
- True
- False
False
Symmetric encryption consists of _____ key/s for encryption and decryption
1