Secure Communications Flashcards
When using a Secure Terminal Equipment (STE), what is encrypted?
The digital signal.
When using a Secure Terminal Equipment (STE), what is encrypted?
The digital signal.
What is the difference between data encryption and voice encryption?
In data, the encryption is handled by separate device.
What components are used in both encryption and decryption?
Algorithm and key.
What are the two basic types of computer cryptology?
Symmetric-secret key system and asymmetric-public key system.
Which cryptology system has a disadvantage of using more processing power and time?
Asymmetric.
Which authorities are trusted entities that issue certificates?
Certification.
In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the
web server give to the browser?
Its public key.
In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the
web server give to the browser?
Its public key.
What is the difference between data encryption and voice encryption?
In data, the encryption is handled by separate device.
What components are used in both encryption and decryption?
Algorithm and key.
What are the two basic types of computer cryptology?
Symmetric-secret key system and asymmetric-public key system.
Which cryptology system has a disadvantage of using more processing power and time?
Asymmetric.
Which authorities are trusted entities that issue certificates?
Certification.
What infrastructure is a set of hardware, software, policies and procedures used to create,
manage, store, distribute and revoke digital certificates?
Public Key.
Which Communications Security (COMSEC) application provides us with guidance to
deter, detect, and defeat hostile acts against US Air Force priority resources?
Physical security.
What are the two major types of encryption algorithms in use today that operate by
encrypting or decrypting one chunk of data at a time?
Block algorithms and stream ciphers.
Data Encryption Standard (DES) uses how many bits for its key?
64.
Triple Data Encryption Standard (DES) is based on three compound operations of
encryption/decryption and can incorporate the use of how many individual keys?
Three.