Quiz 3 Flashcards
3DES is \_\_\_\_\_\_\_\_. strong enough for communication in corporations very slow expensive in terms of processing cost All of the above
All of the above
A DES key is 40 bits long. (True False)
False
An attack where an adversary intercepts an encrypted message and transmits it again later is called a \_\_\_\_\_\_\_\_. replay attack reex attack resend attack reection attack
replay attack
DES uses block encryption.
True False
True
HMACs provide the cryptographic protection of \_\_\_\_\_\_\_\_. message integrity message authentication Both A and B Neither A nor B
Both A and B
Hashing is \_\_\_\_\_\_\_\_. repeatable reversible Both A and B Neither A nor B
repeatable
Julia encrypts a message to David using public key encryption for condentiality. After encrypting the message, can Julia
decrypt it?
(True / False)
False
In public key encryption, “signing” is the act of ________.
adding the password to the challenge message and hashing the two
hashing the plain text message
encrypting the message digest with its own private key
encrypting the message digest with its own public key
encrypting the message digest with its own private key
In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier’s public key.
(True False)
False
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits? 14 times as long 7 times as long 256 times as long 128 times as long
128 times as long
The best way to thwart exhaustive searches by cryptanalysts is \_\_\_\_\_\_\_\_. to make the key very long to use codes randomize the key thoroughly All of the above
to make the key very long
Symmetric session key exchange can be done with public key encryption.
(True / False)
True
When two parties communicate with each other using symmetric key encryption, how many keys are used in total to encrypt and decrypt? 8 1 4 2
1
When a hashing algorithm is applied, the hash will ALWAYS have a fixed length (True / False)
True
When Carol sends a message to Bob, Bob will use \_\_\_\_\_\_\_\_ to decrypt the message. Carol's public key Bob's private key Carol's private key the private key
Bob’s private key