Exam 2: Symmetric Encryption and Message Confidentiality
Exam 1: Introduction44 Questions
Exam 2: Symmetric Encryption and Message Confidentiality29 Questions
Exam 3: Public-Key Cryptography and Message Authentication29 Questions
Exam 4: Key Distribution and User Authentication28 Questions
Exam 5: Network Access Control and Cloud Security45 Questions
Exam 6: Transport-Level Security30 Questions
Exam 7: Wireless Network Security45 Questions
Exam 8: Electronic Mail Security45 Questions
Exam 9: Ip Security45 Questions
Exam 10: Malicious Software45 Questions
Exam 11: Intruders30 Questions
Exam 12: Firewalls45 Questions
Select questions type
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: Asymmetric ciphers, Hash functions and message authentication codes, and ___________ .
Free
(Short Answer)
4.8/5
(32)
Correct Answer:
Symmetric block ciphers
A _________ cipher processes the plaintext input in fixed sized blocks and produces a block of ciphertext of equal size for each plaintext block.
Free
(Short Answer)
4.8/5
(20)
Correct Answer:
block
The process of attempting to discover the plaintext or key is known as _________ .
Free
(Short Answer)
4.9/5
(31)
Correct Answer:
cryptanalysis
The Feistel structure is a particular example of the more general structure used by all symmetric block ciphers.
(True/False)
4.8/5
(32)
The ciphertext-only attack is the easiest to defend against because the opponent has the least amount of information to work with.
(True/False)
4.9/5
(29)
The essence of a symmetric block cipher is that a single round offers inadequate security but that multiple rounds offer increasing security.
(True/False)
4.8/5
(40)
With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the _________ .
(Short Answer)
4.9/5
(39)
Smaller block sizes mean greater security but reduced encryption/decryption speed.
(True/False)
4.9/5
(31)
Also referred to as conventional encryption, secret-key, or single-key encryption, _________ encryption was the only type of encryption in use prior to the development of public-key encryption in the late 1970's.
(Short Answer)
4.8/5
(27)
The most commonly used symmetric encryption algorithms are stream ciphers.
(True/False)
4.9/5
(36)
An encryption scheme is __________ if the cost of breaking the cipher exceeds the value of the encrypted information and/or the time required to break the cipher exceeds the useful lifetime of the information.
(Short Answer)
4.8/5
(30)
All encryption algorithms are based on two general principles: _________, in which each element in the plaintext is mapped into another element, and transposition, in which elements in the plaintext are rearranged.
(Short Answer)
4.8/5
(32)
Two requirements for secure use of symmetric encryption are: sender and receiver must have obtained copies of the secret key in a secure fashion and a strong __________ is needed.
(Short Answer)
4.8/5
(36)
In the _________ mode the input to the encryption algorithm is the XOR of the current plaintext block and the preceeding ciphertext block; the same key is used for each block.
(Short Answer)
4.8/5
(38)
__________ is a stream cipher used in the Secure Sockets Layer/Transport Layer Security standards that have been defined for communication between Web browsers and servers and is also used in WEP and WPA protocols.
(Short Answer)
4.8/5
(39)
Public-key encryption is also referred to as conventional encryption, secret-key, or single-key encryption.
(True/False)
4.9/5
(40)
Triple DES was first standardized for use in financial applications in ANSI standard X9.17 in 1985.
(True/False)
5.0/5
(41)
Showing 1 - 20 of 29
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)