MOD 12 QUIZ - PKI and Cryptographic Applications Flashcards
In public key cryptosystems, each user has how many keys?
Two
A digital signature is a(n) _________________.
encrypted message digest
To verify a signature, what must be done?
decrypt using public key and generate a digest
What does FIPS stand for?
Federal Information Processing Standard
What does PKI stand for?
Public Key Infrastructure
What conditions must a hash function satisfy?
Easy to compute
Collision resistant
One-way
What are the steps involved in Certificates?
What are Certificate Authorities?
Neutral organizations that offer notarization services for digital certificates
Is MD2 a secure hashing algorithm?
What does TOR allow?
Anonymous hosting
Anonymous browsing
What is Quantum Supremacy?
The ability for quantum computers to solve hard problems
RSA depends on what for security?
Computational difficulty
HMAC guarantees what?
Integrity
How large is the message digest for a SHA-256 hash?
256 bits
When digitally signing a document a ________ is _____________ using a __________
What is Analytic Attack?
What is Implementation Attack?
What is a Brute Force Attack?
What is a Side-Channel Attack?
What is a Timing Attack?
What block size is used by SHA-512?
1024 bit
What does SHA stand for?
Secure Hash Algorithm
An RSA key of 3072 is equivalent to which other keys?
A Hash function takes in __________ bits and outputs __________ bits
variable
fixed length
What are the goals for digital signature systems
That a message came from the claimed sender
That the message was not altered
What provides assurance that the people they are communicating with truly are who they claim to be?
Certificates
Asymmetric key cryptography uses what kinds of key(s)?
Public and Private keys
What is the hash-value length of a RIPEMD-256 hash?
256 bits
What is Steganography?
Hiding messages in other messages