Exam 5: Basic Cryptography

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match the following terms to the appropriate definitions -​An algorithm that takes one character and replaces it with one character.

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

J

How can steganography be used to hide information in something other than images?

Free
(Essay)
4.9/5
(33)
Correct Answer:
Verified

Steganography can be used to hide data within the file header fields that describe the file, between sections of the metadata.

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

D

Match the following terms to the appropriate definitions -An asymmetric encryption key that does not have to be protected.​

(Multiple Choice)
4.7/5
(34)

Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?

(Multiple Choice)
4.9/5
(33)

The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.

(Short Answer)
5.0/5
(28)

Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:

(Multiple Choice)
5.0/5
(33)

Data that is in an unencrypted form is referred to as which of the following?

(Multiple Choice)
4.9/5
(38)

Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

(Multiple Choice)
4.9/5
(35)

Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.

(True/False)
4.7/5
(36)

What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?

(Multiple Choice)
4.9/5
(24)

A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.

(True/False)
4.8/5
(30)

Discuss how cryptography can help ensure the availability of the data.

(Essay)
4.9/5
(46)

The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

(Multiple Choice)
4.8/5
(30)

Match the following terms to the appropriate definitions -A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.​

(Multiple Choice)
4.8/5
(35)

What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?

(Multiple Choice)
4.9/5
(41)

The Data Encryption Standard is a(n) ______________ cipher.

(Short Answer)
4.8/5
(26)

A block cipher works on a single character at a time, and is faster than a stream cipher.

(True/False)
4.8/5
(32)

Match the following terms to the appropriate definitions -​An algorithm that uses elliptic curves instead of prime numbers to compute keys

(Multiple Choice)
4.8/5
(39)

Match the following terms to the appropriate definitions -A cipher that manipulates an entire block of plaintext at one time.​

(Multiple Choice)
4.9/5
(34)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)