Lesson 7 Flashcards
What does hashing do?
With hashing, it is very unlikely to determine the original document from the hash value.
answer: it’s a one-way encryption
Encryption strength is a measure of:
Encryption strength is a measure of the encryption’s ability to resist brute force attacks. This is determined by the encryption community. The remaining items are not related to the definition of encryption strength.
Asymmetric encryption uses:
Asymmetric encryption uses different keys for encryption and decryption. The remaining items either don’t describe asymmetric encryption, or would produce unreadable information.
Symmetric encryption uses:
Symmetric Encryption uses the same key for encryption and decryption. The remaining items either don’t describe symmetric encryption, or produce unreadable information.
The U.S. Government adopted AES as a standard in what year?
The US Government adopted AES as a standard in 2002 after a shake-down period. NIST released it during the previous year.
AES uses a blocking size of?
The block Size of AES is 128 bits. This is part of the technical description for the technology.
The National Institute of Standards and Technology (NIST) released AES in what year?
NIST released AES in 2001. It subsequently became a US Government standard the following year.
A benefit of symmetric encryption is:
In terms of system performance, symmetric encryption is preferred to asymmetric encryption which adds to the size of the message to be sent and also increases message transmission time.
Which of the following best defines cryptanalysis?
Cryptanalysis refers to the study of determining the cipher that was used when encrypting data. Once the cipher is determined, the encrypted data can then be decrypted and made readable.
Areas of weakness - What is cryptography - definitions and uses
The roots of modern encryption can be traced back almost _____ years.
4,000
Secure user authentication in cryptography is achieved by _____.
password encryption
What is cryptography?
Cryptography is defined as the system by which data and information of value are stored or transmitted in such a way that only those for whom it is intended can read interpret or process it.
answer: crypt process of encrypt data in transmission or in storage prevent snooping
Cryptography is used to conceal data in transmission by the use of _____.
encryption