Lecture 9 Flashcards

PKI & Cryptographic applications

1
Q

What algorithm depends upon the computational complexity inherent in factoring large integer numbers?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ cryptography has a higher degree of computational requirements.

A

asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

______ is the backbone of a large number of well-known security infrastructures

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

______ is based upon the computational complexity of factoring large integer numbers.

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a super-increasing sequence?

A

Every element of a sequence is greater than the sum of all previous elements in the sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

________ depends on the ability to compute a point multiplication and the inability to compute the multiplicand given the original point and the product.

A

Elliptic Curve Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The problem of finding x, given P and Q is known as what?

A

elliptic curve discrete logarithm problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ______ takes a potentially long message and generates a unique output value.

A

Hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A sender generates a message digest. What must be true to verify that the message was not modified?

A

The recipient uses the same hash function to recompute the message digest and compare. If the 2 match the message was not altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is true of a hash function?

A. Input can be any length
B. output can be any length
C. It is one-way
D. Difficult to compute
E. Output has a fixed length
A

A. Input can be any length
C. It is one-way
E. Output has a fixed length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_____ takes an input of any length and produces a 160-bit message digest. It processes a message in 512-bit blocks.

A. SHA-1
B. SHA-2
C. MD5
D. RSA

A

A. SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ has 4 variants. It can produce a 224,256,512, or 382-bit message digest. The block size can be 512-bit bock or 1024-bit block.

A. SHA-1
B. SHA-2
C. MD5
D. RSA

A

B. SHA-2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Digital signatures provide for what? Select all that apply.

A. Delivery verification
B. Nonrepudiation
C. Protection again modification

A

B. Nonrepudiation

C. Protection again modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NIST created ______ which specifies the approved digital signature algorithms.

A

Digital Signature Standard (DSS) FIPS 186-4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

______ provides assurance that people are who they claim to be.

A

Digital Certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Certificates generally conform to the _____ standard.

A. X.500
B. X.510
C. X.509
D. X.515

A

C. X.509

17
Q

____ are neutral organizations offering notarization services for digital certificates.

A. Certificate Authorities (CA)
B. Registration Authorities (RA)
C. Intermediate Authorities (IA)

A

A. Certificate Authorities (CA)

18
Q

________ can be authorized to help verify identities before certificates are issued.

A. Certificate Authorities (CA)
B. Registration Authorities (RA)
C. Intermediate Authorities (IA)

A

B. Registration Authorities (RA)

19
Q

What are at least 2 reasons a certificate may be revoked?

A

it was compromised
it was erroneously issued
details may have changed
security association changed (example: employee was fired)

20
Q

The _____ or ______ checks for revoked certificates.

A

CRL (certificate revocation list)

OCSP (online certificate status protocol)

21
Q

This is the ‘defacto’ standard as email encryption and uses RSA encryption and X.509 certificates for exchanging cryptographic keys.

A

Secure multipurpose internet mail extensions (S/MIME)

22
Q

Websites can use which 2 technologies for secure communications?

A. HTTPS
B. SSL
C. S-HTTP
D. TLS

A

B. SSL

C. S-HTTP

23
Q

____ uses port 443 to negotiate encrypted communications between web servers and clients. It keeps a channel open for the entire session.

A

HTTPS (uses SSL)

24
Q

______ secures individual messages between a client and server and supports 2 way authentication between clients and servers.

A

S-HTTP

25
Q

______ is the science of hiding messages in plain sight.

A

Steganography

26
Q

_____ is a standard for protecting e-commerce transactions.

A

Secure Electronic Transaction (SET)

27
Q

In ____ encryption, the entire communication is encrypted (data, header, trailer, address, etc.)

A

link

28
Q

The standard architecture set by the IETF for setting up a secure channel between 2 parties. It uses public key cryptography.

A

IPSec (internet protocol security)

29
Q

____ provides assurances of message integrity and nonrepudiation.

A

Authentication Header

30
Q

IPSec has two modes.

A

Transport - packet payload is encrypted

Tunnel- entire packet, including header, is encrypted

31
Q

Wireless encryption provides encryption from the client to the______.

A

wireless access point