Deck 12: Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/58
Play
Full screen (f)
Deck 12: Cryptography
1
The Purple Machine code was broken by ____, a cryptanalyst for the U.S. government and known as the "Father of U.S. Cryptanalysis."
A)Arthur Scherbius
B)Bruce Schneier
C)William Frederick Friedman
D)Herbert O.Yardley
A)Arthur Scherbius
B)Bruce Schneier
C)William Frederick Friedman
D)Herbert O.Yardley
C
2
Symmetric algorithms use two keys that are mathematically related.
False
3
____ is an asymmetrical algorithm that can be used to encrypt data, create a digital signature, and exchange secret keys.
A)Diffie-Hellman
B)ElGamal
C)Blowfish
D)AES
A)Diffie-Hellman
B)ElGamal
C)Blowfish
D)AES
B
4
A famous encryption device was the ____ machine developed by Arthur Scherbius and used by the Germans during World War II.
A)Purple
B)Enigma
C)Caesar
D)Vigenere
A)Purple
B)Enigma
C)Caesar
D)Vigenere
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
5
____, developed by Bruce Schneier, is a block cipher that operates on 64-bit blocks of plaintext.
A)Advanced Encryption Standard (AES)
B)RC5
C)International Data Encryption Algorithm (IDEA)
D)Blowfish
A)Advanced Encryption Standard (AES)
B)RC5
C)International Data Encryption Algorithm (IDEA)
D)Blowfish
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
6
AES uses a 128-bit key and is used in PGP encryption software.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
7
After DES was in service for many years, NIST decided that a new standard was in order: ____.
A)Advanced Encryption Standard (AES)
B)RC5
C)International Data Encryption Algorithm (IDEA)
D)Blowfish
A)Advanced Encryption Standard (AES)
B)RC5
C)International Data Encryption Algorithm (IDEA)
D)Blowfish
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
8
____, developed by Xuejia Lai and James Massey, is a block cipher that operates on 64-bit blocks of plaintext.
A)Advanced Encryption Standard (AES)
B)RC5
C)International Data Encryption Algorithm (IDEA)
D)Blowfish
A)Advanced Encryption Standard (AES)
B)RC5
C)International Data Encryption Algorithm (IDEA)
D)Blowfish
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
9
____ is used for encryption as well as digital signatures and key exchange.
A)Diffie-Hellman
B)ECC
C)Blowfish
D)AES
A)Diffie-Hellman
B)ECC
C)Blowfish
D)AES
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
10
MD5 is a variation of the SHA-1 hashing algorithm that processes blocks twice the size of SHA-1.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
11
____ means that a user can't deny he or she sent a message to a recipient, and the receiver of a message can't deny ever receiving the message.
A)Authentication
B)Nonrepudiation
C)Availability
D)Integrity
A)Authentication
B)Nonrepudiation
C)Availability
D)Integrity
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
12
____ refers to verifying the sender or receiver (or both) is who he or she claims to be.
A)Authentication
B)Nonrepudiation
C)Availability
D)Authorization
A)Authentication
B)Nonrepudiation
C)Availability
D)Authorization
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
13
Symmetric algorithms support confidentiality, but not authentication and nonrepudiation.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
14
The Book of Jeremiah was written using a cipher, or key, known as ____.
A)atbash
B)Enigma
C)Caesar
D)Vigenere
A)atbash
B)Enigma
C)Caesar
D)Vigenere
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
15
Even though DEA uses 64-bit encryption, only ____ bits are effectively being used.
A)48
B)50
C)56
D)60
A)48
B)50
C)56
D)60
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
16
ECC is an efficient algorithm requiring few resources (memory, disk space, bandwidth, and so on), so it's a perfect candidate for wireless devices and cellular telephones.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
17
RSA was developed by three MIT professors:Ronald L.Rivest, ____, and Leonard M. Adleman.
A)Arthur Scherbius
B)Eugene Spafford
C)Bruce Schneier
D)Adi Shamir
A)Arthur Scherbius
B)Eugene Spafford
C)Bruce Schneier
D)Adi Shamir
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
18
In a chosen-ciphertext attack, the attacker needs access to the cryptosystem to perform the attack.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
19
Asymmetric algorithms are more scalable than symmetric systems. However, they are slower than symmetric algorithms.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
20
The ____ algorithm does not provide encryption but is used to establish the secret key between two parties.
A)Elgamal
B)Blowfish
C)Diffie-Hellman
D)RSA
A)Elgamal
B)Blowfish
C)Diffie-Hellman
D)RSA
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
21
The program ____ is one of the best programs available today for cracking password files.
A)John the Ripper
B)Hydra (THC)
C)Pwdump3v2
D)EXPECT
A)John the Ripper
B)Hydra (THC)
C)Pwdump3v2
D)EXPECT
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
22
In 1991, NIST established a standard called ___________________________________ to ensure that digital signatures could be verified.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
23
In a ____ attack, the attacker has access to plaintext and ciphertext and the ability to choose which messages to encrypt.
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
24
In a ____ attack, the attacker has the ciphertext of several messages that were encrypted with the same encryption algorithm but has no access to the plaintext, so he or she must try to figure out the key used to encrypt the data.
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
25
MATCHING
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
uses a single key to encrypt and decrypt data
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
uses a single key to encrypt and decrypt data
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
26
Another name for asymmetric algorithms is ____________________ key cryptography, and these terms are often used interchangeably.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
27
Cryptography is the process of converting plaintext, which is readable text, into ____________________, which is unreadable or encrypted text.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
28
____ is the original password-cracking program now used by many government agencies to test for password strength.
A)John the Ripper
B)Hydra (THC)
C)Pwdump3v2
D)L0phtcrack
A)John the Ripper
B)Hydra (THC)
C)Pwdump3v2
D)L0phtcrack
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
29
____________________ attacks are used to find the same hash value for two different inputs.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
30
In a ____ attack, an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters.
A)brute force
B)replay
C)ciphertext-only
D)dictionary
A)brute force
B)replay
C)ciphertext-only
D)dictionary
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
31
In a ____ attack, after an attacker has access to a password file, he or she can run a password-cracking program that uses a dictionary of known words or passwords as an input file.
A)brute force
B)replay
C)ciphertext-only
D)dictionary
A)brute force
B)replay
C)ciphertext-only
D)dictionary
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
32
In a(n) ____________________ attack, the attacker captures data and attempts to resubmit the captured data so that the device, which can be a computer or router, thinks a legitimate connection is in effect.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
33
In a ____ attack, the attacker has access to the ciphertext to be decrypted and to the resulting plaintext.
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
34
In a ____ attack, the attacker has messages in both encrypted form and decrypted forms.
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
35
____ is a hashing algorithm developed by Rivest in 1991.
A)RSA
B)MD5
C)SHA-1
D)HAVAL
A)RSA
B)MD5
C)SHA-1
D)HAVAL
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
36
A certificate contains a unique serial number and must follow the ____ standard that describes the makings of a certificate.
A)NIST
B)IEEE 802
C)PKI
D)X.509
A)NIST
B)IEEE 802
C)PKI
D)X.509
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
37
____________________ is a form of hiding data in plain view in pictures, graphics, or text.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
38
The CA compiles a(n) ___________________________________ that contains all revoked and suspended certificates.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
39
____ is a scripting language for Windows and Linux that performs repetitive tasks, such as password cracking.
A)John the Ripper
B)Hydra (THC)
C)Pwdump3v2
D)EXPECT
A)John the Ripper
B)Hydra (THC)
C)Pwdump3v2
D)EXPECT
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
40
____ was developed by Phil Zimmerman as a free e-mail encryption program that allowed typical users to encrypt e-mail messages.
A)PKI
B)PEM
C)PGP
D)S/MIME
A)PKI
B)PEM
C)PGP
D)S/MIME
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
41
What is RC5?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
42
MATCHING
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
output of a hashing algorithm
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
output of a hashing algorithm
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
43
MATCHING
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
occurs if two different messages produce the same hash value
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
occurs if two different messages produce the same hash value
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
44
What is 3DES?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
45
What is a digital signature?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
46
MATCHING
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
uses two keys, one to encrypt and one to decrypt data
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
uses two keys, one to encrypt and one to decrypt data
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
47
MATCHING
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
digital document that verifies that the two parties exchanging data over the Internet are really who they claim to be
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
digital document that verifies that the two parties exchanging data over the Internet are really who they claim to be
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
48
MATCHING
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
property of a good hashing algorithm
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
property of a good hashing algorithm
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
49
What is a substitution cipher?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
50
MATCHING
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
operates on blocks of plaintext
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
operates on blocks of plaintext
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
51
How does public key infrastructure work?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
52
What is cryptanalysis?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
53
What is a certificate?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
54
What is a one-way function? Provide an example or an analogy to help explain the concept.
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
55
What is the difference between a public key and a private key?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
56
MATCHING
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
operates on plaintext one bit at a time
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
operates on plaintext one bit at a time
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
57
MATCHING
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
takes a variable-length input and converts it to a fixed-length output string
Match each term with the correct statement below.
a.asymmetric encryption
f.collision
b.collision free
g.stream cipher
c.symmetric encryption
h.message digest
d.certificate
i.block cipher
e.hashing
takes a variable-length input and converts it to a fixed-length output string
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck
58
How can confidentiality and authentication be achieved using public key cryptography?
Unlock Deck
Unlock for access to all 58 flashcards in this deck.
Unlock Deck
k this deck