Matching
Match each item with a statement below:
Premises:
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
identifies a specific entity as the source or origin of a given piece of data
takes the original data, divides it into digits, and encrypts each digit one at a time
traditional technique for detecting if data inadvertently changes during transmission
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
a fixed-size checksum created by cryptographic hash functions
Responses:
Data origin authentication
Snooping
Digital signature algorithm (DSA)
Message digest
Entity authentication
Stream cipher
Block cipher
Replay attack
Checksum
Correct Answer:
Premises:
Responses:
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
identifies a specific entity as the source or origin of a given piece of data
takes the original data, divides it into digits, and encrypts each digit one at a time
traditional technique for detecting if data inadvertently changes during transmission
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
a fixed-size checksum created by cryptographic hash functions
Premises:
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
identifies a specific entity as the source or origin of a given piece of data
takes the original data, divides it into digits, and encrypts each digit one at a time
traditional technique for detecting if data inadvertently changes during transmission
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
a fixed-size checksum created by cryptographic hash functions
Responses:
Related Questions
Q32: What are the main characteristics of AES?
Q33: _ is a set of computer networking
Q34: Describe the CBC rollover problem.
Q35: _ is the assurance that an entity
Q36: For communication among former unknown parties, _
Q37: What are the differences between dictionary and
Q38: The company RSA Data Security initially published
Q39: Describe the main characteristics of symmetric key
Q40: Describe the meet-in-the-middle attack.
Q42: What is the format of a X.500
Unlock this Answer For Free Now!
View this answer and more for free by performing one of the following actions
Scan the QR code to install the App and get 2 free unlocks
Unlock quizzes for free by uploading documents