Deck 2: Symmetric Encryption and Message Confidentiality

ملء الشاشة (f)
exit full mode
سؤال
The _________ algorithm takes the ciphertext and the same secret key and produces the original plaintext.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The security of symmetric encryption depends on the secrecy of the algorithm, not the secrecy of the key.
سؤال
The primary advantage of a stream cipher is that stream ciphers are almost always faster and use far less code than do block ciphers.
سؤال
Smaller block sizes mean greater security but reduced encryption/decryption speed.
سؤال
Triple DES was first standardized for use in financial applications in ANSI standard X9.17 in 1985.
سؤال
An encryption scheme is __________ if the cost of breaking the cipher exceeds the value of the encrypted information and/or the time required to break the cipher exceeds the useful lifetime of the information.
سؤال
With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the _________ .
سؤال
The Feistel structure is a particular example of the more general structure used by all symmetric block ciphers.
سؤال
Public-key encryption is also referred to as conventional encryption, secret-key, or single-key encryption.
سؤال
The ciphertext-only attack is the easiest to defend against because the opponent has the least amount of information to work with.
سؤال
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: Asymmetric ciphers, Hash functions and message authentication codes, and ___________ .
سؤال
Random numbers play an important role in the use of encryption for various network security applications.
سؤال
Ciphertext is the scrambled message produced as output.
سؤال
The most commonly used symmetric encryption algorithms are stream ciphers.
سؤال
The essence of a symmetric block cipher is that a single round offers inadequate security but that multiple rounds offer increasing security.
سؤال
The principal drawback of 3DES is that the algorithm is relatively sluggish in software.
سؤال
The advantage of a block cipher is that you can reuse keys.
سؤال
AES uses a Feistel structure.
سؤال
The process of attempting to discover the plaintext or key is known as _________ .
سؤال
A _________ cipher processes the plaintext input in fixed sized blocks and produces a block of ciphertext of equal size for each plaintext block.
سؤال
In the _________ mode the input to the encryption algorithm is the XOR of the current plaintext block and the preceeding ciphertext block; the same key is used for each block.
سؤال
The three most important symmetric block ciphers are: triple DES (3DES), the Advanced Encryption Standard (AES), and the ___________ .
سؤال
All encryption algorithms are based on two general principles: _________, in which each element in the plaintext is mapped into another element, and transposition, in which elements in the plaintext are rearranged.
سؤال
Many symmetric block encryption algorithms including DES have a structure first described by _________ of IBM in 1973.
سؤال
__________ is a stream cipher used in the Secure Sockets Layer/Transport Layer Security standards that have been defined for communication between Web browsers and servers and is also used in WEP and WPA protocols.
سؤال
The ________ source is drawn from the physical environment of the computer and could include things such as keystroke timing patterns, disk electrical activity, mouse movements, and instantaneous values of the system clock.
سؤال
Two requirements for secure use of symmetric encryption are: sender and receiver must have obtained copies of the secret key in a secure fashion and a strong __________ is needed.
سؤال
A PRNG takes as input a fixed value called the ________ and produces a sequence of output bits using a deterministic algorithm.
سؤال
Also referred to as conventional encryption, secret-key, or single-key encryption, _________ encryption was the only type of encryption in use prior to the development of public-key encryption in the late 1970's.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Symmetric Encryption and Message Confidentiality
1
The _________ algorithm takes the ciphertext and the same secret key and produces the original plaintext.
decryption
2
The security of symmetric encryption depends on the secrecy of the algorithm, not the secrecy of the key.
False
3
The primary advantage of a stream cipher is that stream ciphers are almost always faster and use far less code than do block ciphers.
True
4
Smaller block sizes mean greater security but reduced encryption/decryption speed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
5
Triple DES was first standardized for use in financial applications in ANSI standard X9.17 in 1985.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
6
An encryption scheme is __________ if the cost of breaking the cipher exceeds the value of the encrypted information and/or the time required to break the cipher exceeds the useful lifetime of the information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
7
With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the _________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
8
The Feistel structure is a particular example of the more general structure used by all symmetric block ciphers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
9
Public-key encryption is also referred to as conventional encryption, secret-key, or single-key encryption.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
10
The ciphertext-only attack is the easiest to defend against because the opponent has the least amount of information to work with.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
11
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: Asymmetric ciphers, Hash functions and message authentication codes, and ___________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
12
Random numbers play an important role in the use of encryption for various network security applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
13
Ciphertext is the scrambled message produced as output.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
14
The most commonly used symmetric encryption algorithms are stream ciphers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
15
The essence of a symmetric block cipher is that a single round offers inadequate security but that multiple rounds offer increasing security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
16
The principal drawback of 3DES is that the algorithm is relatively sluggish in software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
17
The advantage of a block cipher is that you can reuse keys.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
18
AES uses a Feistel structure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
19
The process of attempting to discover the plaintext or key is known as _________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
20
A _________ cipher processes the plaintext input in fixed sized blocks and produces a block of ciphertext of equal size for each plaintext block.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
21
In the _________ mode the input to the encryption algorithm is the XOR of the current plaintext block and the preceeding ciphertext block; the same key is used for each block.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
22
The three most important symmetric block ciphers are: triple DES (3DES), the Advanced Encryption Standard (AES), and the ___________ .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
23
All encryption algorithms are based on two general principles: _________, in which each element in the plaintext is mapped into another element, and transposition, in which elements in the plaintext are rearranged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
24
Many symmetric block encryption algorithms including DES have a structure first described by _________ of IBM in 1973.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
25
__________ is a stream cipher used in the Secure Sockets Layer/Transport Layer Security standards that have been defined for communication between Web browsers and servers and is also used in WEP and WPA protocols.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ________ source is drawn from the physical environment of the computer and could include things such as keystroke timing patterns, disk electrical activity, mouse movements, and instantaneous values of the system clock.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
27
Two requirements for secure use of symmetric encryption are: sender and receiver must have obtained copies of the secret key in a secure fashion and a strong __________ is needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
28
A PRNG takes as input a fixed value called the ________ and produces a sequence of output bits using a deterministic algorithm.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
29
Also referred to as conventional encryption, secret-key, or single-key encryption, _________ encryption was the only type of encryption in use prior to the development of public-key encryption in the late 1970's.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 29 في هذه المجموعة.