Exam 2: Cryptographic Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

If the only form of attack that could be made on an encryption algorithm is brute-force,then the way to counter such attacks would be to __________ .

(Multiple Choice)
4.7/5
(37)

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.

(Multiple Choice)
4.7/5
(37)

A message authentication code is a small block of data generated by a secret key and appended to a message.

(True/False)
4.8/5
(35)

Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

(True/False)
4.8/5
(41)

Digital signatures and key management are the two most important applications of __________ encryption.

(Multiple Choice)
4.7/5
(34)

Public-key algorithms are based on simple operations on bit patterns.

(True/False)
4.8/5
(35)

The two criteria used to validate that a sequence of numbers is random are independence and _________ .

(Short Answer)
4.9/5
(29)

Two of the most important applications of public-key encryption are digital signatures and key management.

(True/False)
4.9/5
(26)

The __________ is the encryption algorithm run in reverse.

(Multiple Choice)
4.9/5
(33)

The simplest approach to multiple block encryption is known as __________ mode,in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.

(Short Answer)
4.9/5
(35)

In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.

(Short Answer)
4.7/5
(34)

The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext.

(Short Answer)
4.8/5
(32)

T F 4.The secret key is input to the encryption algorithm.

(True/False)
4.8/5
(35)

A __________ processes the input elements continuously,producing output one element at a time.

(Short Answer)
4.8/5
(37)

__________ is the scrambled message produced as output.

(Multiple Choice)
4.8/5
(38)

__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.

(Short Answer)
4.8/5
(34)

The advantage of a stream cipher is that you can reuse keys.

(True/False)
4.8/5
(28)

A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

(Short Answer)
4.9/5
(39)

Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data.

(True/False)
4.7/5
(34)

The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

(True/False)
4.8/5
(33)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)