MOD 12 QUIZ - PKI and Cryptographic Applications Flashcards

1
Q

In public key cryptosystems, each user has how many keys?

A

Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A digital signature is a(n) _________________.

A

encrypted message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To verify a signature, what must be done?

A

decrypt using public key and generate a digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does FIPS stand for?

A

Federal Information Processing Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does PKI stand for?

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What conditions must a hash function satisfy?

A

Easy to compute
Collision resistant
One-way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps involved in Certificates?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Certificate Authorities?

A

Neutral organizations that offer notarization services for digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is MD2 a secure hashing algorithm?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does TOR allow?

A

Anonymous hosting
Anonymous browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Quantum Supremacy?

A

The ability for quantum computers to solve hard problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RSA depends on what for security?

A

Computational difficulty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HMAC guarantees what?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How large is the message digest for a SHA-256 hash?

A

256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When digitally signing a document a ________ is _____________ using a __________

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Analytic Attack?

A
17
Q

What is Implementation Attack?

A
18
Q

What is a Brute Force Attack?

A
18
Q

What is a Side-Channel Attack?

A
19
Q

What is a Timing Attack?

A
20
Q

What block size is used by SHA-512?

A

1024 bit

21
Q

What does SHA stand for?

A

Secure Hash Algorithm

22
Q

An RSA key of 3072 is equivalent to which other keys?

A
23
Q

A Hash function takes in __________ bits and outputs __________ bits

A

variable
fixed length

24
Q

What are the goals for digital signature systems

A

That a message came from the claimed sender
That the message was not altered

25
Q

What provides assurance that the people they are communicating with truly are who they claim to be?

A

Certificates

26
Q

Asymmetric key cryptography uses what kinds of key(s)?

A

Public and Private keys

27
Q

What is the hash-value length of a RIPEMD-256 hash?

A

256 bits

28
Q

What is Steganography?

A

Hiding messages in other messages