Exam 8: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network decrypts the message sent to it and then reencrypts it using different keys and sends it to the next neighbor. This process continues until the message reaches the final destination.

Free
(True/False)
4.9/5
(38)
Correct Answer:
Verified

False

Within a PKI, a(n)registration authority issues, manages, authenticates, signs, and revokes users' digital certificates, which typically contain the user name, public key, and other identifying information. _________________________

Free
(True/False)
4.7/5
(36)
Correct Answer:
Verified

False

Digital ____________________ are encrypted messages that can be mathematically proven to be authentic.

Free
(Short Answer)
4.9/5
(35)
Correct Answer:
Verified

signatures

Describe digital certificates.

(Essay)
4.9/5
(42)

A(n) ____________________ substitution uses one alphabet.

(Short Answer)
4.9/5
(37)

A digital ____________________ is an electronic document or container file that contains a key value and identifying information about the entity that controls the key.

(Short Answer)
4.9/5
(35)

The S-HTTP security solution provides six services: authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management.

(True/False)
4.8/5
(45)

Hashing functions require the use of keys.

(True/False)
4.8/5
(39)

The Digital Signature Standard established by NIST is used for electronic document authentication by federal information systems. It is based on a variant of the ElGamal algorithm. _________________________

(True/False)
4.9/5
(33)

Bluetooth is a de facto industry standard for short-range wireless communications between devices.

(True/False)
4.9/5
(36)

In 1917, Gilbert S. Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key.

(True/False)
4.8/5
(36)

In a book cipher, the key consists of a list of codes representing the page number, line number, and word number of the plaintext word. _________________________

(True/False)
4.9/5
(36)

The process of hiding messages within the digital encoding of a picture or graphic is called ____________________.

(Short Answer)
4.9/5
(36)

Bit stream methods commonly use algorithm functions like the exclusive OR operation (__________).

(Multiple Choice)
4.9/5
(40)

__________ is a protocol that can be used to secure communications across any IP-based network such as LANs, WANs, and the Internet.

(Multiple Choice)
4.8/5
(31)

____________________ is the process of making and using codes to secure the transmission of information.

(Short Answer)
4.8/5
(36)

The more common name for asymmetric encryption is ____________________-key encryption.

(Short Answer)
4.9/5
(36)

DES uses a(n) ___________-bit block size.

(Multiple Choice)
4.8/5
(40)

A cryptovariable is a value representing the application of a hash algorithm on a message.

(True/False)
4.9/5
(42)

To perform the Caesar cipher encryption operation, the pad values are added to numeric values that represent the plaintext that needs to be encrypted.

(True/False)
4.9/5
(34)
Showing 1 - 20 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)