Quiz 3 Flashcards
3DES is \_\_\_\_\_\_\_\_. strong enough for communication in corporations very slow expensive in terms of processing cost All of the above
All of the above
A DES key is 40 bits long. (True False)
False
An attack where an adversary intercepts an encrypted message and transmits it again later is called a \_\_\_\_\_\_\_\_. replay attack reex attack resend attack reection attack
replay attack
DES uses block encryption.
True False
True
HMACs provide the cryptographic protection of \_\_\_\_\_\_\_\_. message integrity message authentication Both A and B Neither A nor B
Both A and B
Hashing is \_\_\_\_\_\_\_\_. repeatable reversible Both A and B Neither A nor B
repeatable
Julia encrypts a message to David using public key encryption for condentiality. After encrypting the message, can Julia
decrypt it?
(True / False)
False
In public key encryption, “signing” is the act of ________.
adding the password to the challenge message and hashing the two
hashing the plain text message
encrypting the message digest with its own private key
encrypting the message digest with its own public key
encrypting the message digest with its own private key
In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier’s public key.
(True False)
False
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits? 14 times as long 7 times as long 256 times as long 128 times as long
128 times as long
The best way to thwart exhaustive searches by cryptanalysts is \_\_\_\_\_\_\_\_. to make the key very long to use codes randomize the key thoroughly All of the above
to make the key very long
Symmetric session key exchange can be done with public key encryption.
(True / False)
True
When two parties communicate with each other using symmetric key encryption, how many keys are used in total to encrypt and decrypt? 8 1 4 2
1
When a hashing algorithm is applied, the hash will ALWAYS have a fixed length (True / False)
True
When Carol sends a message to Bob, Bob will use \_\_\_\_\_\_\_\_ to decrypt the message. Carol's public key Bob's private key Carol's private key the private key
Bob’s private key
What is the hash size of SHA-256? 112 bits 128 bits 160 bits 256 bits
256 bits
Using new and proprietary encryption ciphers is a good idea because cryptanalysts will not know them.
(True / False)
False
To ensure that a digital certicate is valid, the receiver of the certicate must check \_\_\_\_\_\_\_\_. whether the certicate has been revoked the digital signature the valid period All of the above.
All of the above.
The most popular public key cipher is RSA (True / False)
True
\_\_\_\_\_\_\_\_ occurs when companies believe they have good security because they are using proprietary ciphers that hackers do not know. Reasonable protection Security through obscurity Weakest link ignorance
Security through obscurity
\_\_\_\_\_\_\_\_ is the use of mathematical operations to protect messages travelling between parties or stored on a computer. Confidentiality Cryptography Encryption Authentication
Cryptography
Which of the following measures do HMACs use? Public key encryption Symmetric key encryption Hashing All of the above
Hashing
Which of the following is one of the effective key lengths in 3DES? 110 bits 40 bits Both A and B Neither A nor B
Neither A nor B
Programmers frequently create entry points into a program for debugging purposes and/or insertion of new program
codes at a later date. What are these entry points called?
Backdoors
Logic Bombs
Trojan Horses
Worms
Backdoors