Exam 2: Cryptographic Tools

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Public-key algorithms are based on simple operations on bit patterns.

Free
(True/False)
4.9/5
(33)
Correct Answer:
Verified

False

The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

Free
(Short Answer)
4.8/5
(37)
Correct Answer:
Verified

Diffie-Hellman Key Agreement

The secret key is input to the encryption algorithm.

Free
(True/False)
4.9/5
(40)
Correct Answer:
Verified

True

The __________ algorithm takes the ciphertext and the secret key and producesthe original plaintext.

(Short Answer)
4.8/5
(45)

There are two general approaches to attacking a symmetric encryption scheme:cryptanalytic attacks and __________ attacks.

(Short Answer)
4.9/5
(31)

Symmetric encryption is used primarily to provide confidentiality.

(True/False)
4.9/5
(35)

The simplest approach to multiple block encryption is known as __________ mode, in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.

(Short Answer)
4.8/5
(39)

A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

(Short Answer)
4.7/5
(28)

Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is __________ .

(Short Answer)
4.9/5
(41)

__________ is the scrambled message produced as output.

(Multiple Choice)
4.9/5
(34)

Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator.

(Multiple Choice)
4.8/5
(33)

Two of the most important applications of public-key encryption aredigital signatures and key management.

(True/False)
4.8/5
(35)

A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.

(Short Answer)
4.7/5
(28)

The original message or data that is fed into the algorithm is __________.

(Multiple Choice)
4.8/5
(38)

On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack.

(Multiple Choice)
4.9/5
(30)

__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.

(Multiple Choice)
4.9/5
(46)

Triple DES takes a plaintext block of 64 bits and a key of 56 bits toproduce a ciphertext block of 64 bits.

(True/False)
4.9/5
(39)

The strength of a hash function against brute-force attacks dependssolely on the length of the hash code produced by the algorithm.

(True/False)
4.9/5
(31)

Public-key encryption was first publicly proposed by __________ in 1976.

(Short Answer)
4.9/5
(39)

Transmitted data stored locally are referred to as __________ .

(Multiple Choice)
4.8/5
(42)
Showing 1 - 20 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)