QUIZ 1 - Basic Cellular Systems Flashcards

Basic Cellular Systems, Security

1
Q

What length of key does a pure OTP use?

A

A key the same length as P

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does TDMA divide users?

A

By time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Authentication

A

Verification of identities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Diffusion?

A

Each plaintext bit and each key bit should effect each ciphertext bit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the main benefits of Symmetric Key cryptography?

A

Speed and efficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the industry standard block cipher?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the encryption types?

A

Asymmetric
Symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Nonrepudiation?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does LTE mean?

A

Long Term Evolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What process was used to allow multiple simultaneous users in 3G?

A

WCDMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What process was used to allow multiple simultaneous users in 2G?

A

TDMA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the main functions of 3GPP?

A

Communications Management
Radio Resource Management
Mobility Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Cryptography?

A

Designing systems based on secret writing techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Plaintext?

A

Readable text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Ciphertext?

A

Encrypted Text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the formula for Encryption?

A

P * L —> C

16
Q

What is the formula for decryption?

A

C * K —-> P

17
Q

How does FDMA separate users?

A

By frequency

18
Q

What security primitives are contained within the CIA Triad ?

A

Confidentiality
Integrity
Availability

19
Q

What is Cryptanalysis?

A

Analyzing cryptographic systems and trying to find weaknesses.

20
Q

Which hashing algorithm is recommended by NIST?

A

SHA - 256

21
Q

What does a hash function do?

A
22
Q

What process was used to allow multiple simultaneous users in 1G?

A

FDMA