Exam 1: Introduction to Security Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags
Match each item with a statement below:
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Data origin authentication
identifies a specific entity as the source or origin of a given piece of data
Snooping
takes the original data, divides it into digits, and encrypts each digit one at a time
Digital signature algorithm (DSA)
Correct Answer:
Verified
Premises:
Responses:
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Data origin authentication
identifies a specific entity as the source or origin of a given piece of data
Snooping
takes the original data, divides it into digits, and encrypts each digit one at a time
Digital signature algorithm (DSA)
traditional technique for detecting if data inadvertently changes during transmission
Message digest
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Entity authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Stream cipher
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Block cipher
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Replay attack
a fixed-size checksum created by cryptographic hash functions
Checksum
Free
(Matching)
4.7/5
(31)
Correct Answer:
Verified

Describe the meet-in-the-middle attack.

Free
(Essay)
4.8/5
(44)
Correct Answer:
Verified

The meet-in-the-middle attack is an attack that makes use of a space-time trade-off. If you are willing to use more CPU time, you can reduce the memory requirement. For breaking 2DES, the time-memory product remains at 2112. The attacker attempts to find a value in each range and domain of the composition of two functions such that the forward mapping of one through the first function is the same as the inverse image of the other through the second function. In other words, the meet-in-the-middle attack quite literally attacks by finding the meeting point in the middle of the composed function.

Describe a block cipher counter (CTR) mode of operation.

Free
(Essay)
4.7/5
(35)
Correct Answer:
Verified

Diffie and Hellman in 1979 introduced the counter mode encryption, which is another way to turn a block cipher into a stream cipher. Counter mode requires using an n-bit string called a counter. The counter can be produced by any sequence-generation function that is guaranteed not to repeat for a long time. Since the counter generation is independent of the encryption/decryption process, random access is achievable. The ith ciphertext block, Ci , can be encrypted or decrypted in a random-access fashion. Compared with CBC mode, encrypting the ith block requires all of the i-1 prior blocks to be encrypted first.

____ means people who know each other can securely send messages to their friends.

(Multiple Choice)
4.8/5
(29)

Describe the main characteristics of symmetric key encryption.

(Essay)
4.9/5
(33)

____ occurs when an attacker maliciously changes data in transit or in a medium.

(Multiple Choice)
4.8/5
(35)

DES is considered weak by today's standards due to the fact that the key size is only 56 bits.

(True/False)
4.9/5
(28)

The security of the RSA algorithm depends on two mathematic problems: the problem of factoring very large numbers, p and q , and the ____ problem.

(Multiple Choice)
4.8/5
(49)

What are the main characteristics of AES?

(Essay)
4.9/5
(38)

What are the differences between dictionary and brute-force attacks?

(Essay)
4.8/5
(38)

Symmetric key encryptions ensure confidentiality and data ____.

(Multiple Choice)
4.8/5
(36)

A(n) ____ uses a keystream composed of completely random digits.

(Multiple Choice)
4.9/5
(39)

____________________ is the assurance of nonalteration, meaning that the data either in transit or in storage has not been tampered.

(Short Answer)
4.9/5
(29)

Parallel encryption is possible with a block cipher operating in CFB mode.

(True/False)
4.9/5
(32)

The company RSA Data Security initially published ____ to promote and facilitate the use of public key techniques.

(Multiple Choice)
4.7/5
(42)

Schemes that involve hashing with secret keys are called ____ or keyed hashes.

(Multiple Choice)
4.8/5
(39)

____ encoding literally means a positional numbering system using a base of 64.

(Multiple Choice)
4.9/5
(43)

What is the format of a X.500 distinguished name?

(Essay)
4.8/5
(37)

A(n) ____________________ attack is a form of cryptanalysis that presumes that the attacker is able to choose arbitrary plaintexts to be encrypted, in effect obtaining the corresponding ciphertexts.

(Short Answer)
4.9/5
(34)

A common use for cryptographic hash functions is to provide password-storage solutions.

(True/False)
4.9/5
(39)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)