Exam 8: Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

S-HTTP is an extended version of Hypertext Transfer Protocol that provides for the encryption of protected e-mail transmitted via the Internet between a client and server. _________________________

(True/False)
4.9/5
(37)

PKI systems are based on public-key cryptosystems and include digital certificates and certificate authorities.

(True/False)
5.0/5
(30)

A method of encryption that requires the same secret key to encipher and decipher the message is known as __________ encryption.

(Multiple Choice)
4.7/5
(29)

More advanced substitution ciphers use two or more alphabets, and are referred to as __________ substitutions.

(Multiple Choice)
4.8/5
(35)

In addition to being credited with inventing a substitution cipher, Julius Caesar was associated with an early version of the transposition cipher.

(True/False)
4.7/5
(46)

Digital signatures should be created using processes and products that are based on the __________.

(Multiple Choice)
4.7/5
(33)

A(n) ____________________ or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption.

(Short Answer)
4.9/5
(35)

The permutation cipher simply rearranges the values within a block to create the ciphertext.

(True/False)
4.8/5
(32)

Encryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood. _________________________

(True/False)
4.8/5
(39)

The AES algorithm was the first public-key encryption algorithm to use a 256-bit key length.

(True/False)
4.9/5
(46)

Usually, as the length of a cryptovariable increases, the number of random guesses that have to be made in order to break the code is reduced.

(True/False)
4.8/5
(40)

A message ____________________ is a fingerprint of the author's message that is compared with the recipient's locally calculated hash of the same message.

(Short Answer)
4.9/5
(26)

Originally released as freeware, ____________________ is a hybrid cryptosystem that combines some of the best available cryptographic algorithms as an open-source de facto standard for encryption and authentication of e-mail and file storage.

(Short Answer)
4.8/5
(40)

Netscape developed the ____________________ Layer protocol to use public-key encryption to secure a channel over the Internet, thus enabling secure communications.

(Short Answer)
4.8/5
(34)

Hash algorithms are public functions that create a message digest by converting variable-length messages into a single fixed-length value. _________________________

(True/False)
4.9/5
(43)

Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply look up a hashed password and read out the text version.

(Multiple Choice)
4.8/5
(35)

Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys. _________________________

(True/False)
5.0/5
(30)

Common implementations of a registration authority (RA) include functions to issue digital certificates to users and servers.

(True/False)
4.9/5
(33)

Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.

(True/False)
4.9/5
(44)

The science of encryption is known as ____________________.

(Short Answer)
4.8/5
(43)
Showing 41 - 60 of 109
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)