Deck 15: Cryptographic Key Management and Distribution
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
Play
Full screen (f)
Deck 15: Cryptographic Key Management and Distribution
1
A major weakness of the public announcement of public keys is
that anyone can forge a public announcement.
that anyone can forge a public announcement.
True
2
Manual delivery of a key is not reasonable for link encryption.
False
3
For end-to-end encryption over a network, manual delivery is
awkward.
awkward.
True
4
the secure use of cryptographic key algorithms depends on the
protection of the cryptographic keys.
protection of the cryptographic keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
__________ refers to the means of delivering a key to two parties who wish to exchange data, without allowing others to see the key.
A)Manual key delivery
B)Key distribution technique
C)Session key delivery
D)Confidentional key distribution
A)Manual key delivery
B)Key distribution technique
C)Session key delivery
D)Confidentional key distribution
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
For symmetric encryption to work the two parties to an exchange
must share the same key and that key must be protected from
access by others.
must share the same key and that key must be protected from
access by others.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
the point of public-key encryption is that the public key is __________ .
A)public
B)private
C)confidential
D)restricted
A)public
B)private
C)confidential
D)restricted
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
A common requirement in a variety of protocols is for the
encryption of a symmetric key so that it can be distributed to two parties for future communication.
encryption of a symmetric key so that it can be distributed to two parties for future communication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
X.509 is an important standard because the certificate structure
and authentication protocols defined in X.509 are used in a
variety of contexts.
and authentication protocols defined in X.509 are used in a
variety of contexts.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
__________ are often used to limit the time in which a key exchange can take place and/or the lifetime of an exchanged key.
A)Relay messages
B)Session breaks
C)timestamps
D)Keynotes
A)Relay messages
B)Session breaks
C)timestamps
D)Keynotes
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
A key translation center generates and distributes session keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
A certification authority is an authority trusted by one or more
users to create and assign public key certificates.
users to create and assign public key certificates.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A certificate consists of a public key, an identifier of the key owner,
and the whole block signed by a trusted third party.
and the whole block signed by a trusted third party.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
the term __________ refers to a key that is used only once or at most is very short-lived.
A)lower level key
B)digital key
C)cryptographic key
D)ephemeral key
A)lower level key
B)digital key
C)cryptographic key
D)ephemeral key
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Because of the efficiency of public-key cryptosystems, they are
almost always used for the direct encryption of sizable blocks of dat
A.
almost always used for the direct encryption of sizable blocks of dat
A.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
A greater degree of security can be achieved by maintaining a
publicly available dynamic directory of public keys.
publicly available dynamic directory of public keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
A __________ is a server or distributed set of servers that maintains a database of information about users.
A)crypt
B)directory
C)KDC
D)KtC
A)crypt
B)directory
C)KDC
D)KtC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Because certificates are forgeable they cannot be placed in a
directory without the need for the directory to make special
efforts to protect them.
directory without the need for the directory to make special
efforts to protect them.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
X.509 dictates the use of a specific digital signature algorithm and
a specific hash function.
a specific hash function.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
Each user must share a unique key with the key distribution center
for purposes of key distribution.
for purposes of key distribution.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
With the __________ scheme, if an adversary succeeds in obtaining or computing the private key of the directory authority, the adversary could authoritatively pass out counterfeit public keys and subsequently impersonate any participant and eavesdrop on messages sent to any participant.
A)public key authority
B)publicly available directory
C)public key certificates
D)public announcement
A)public key authority
B)publicly available directory
C)public key certificates
D)public announcement
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
A _________ transfers symmetric keys for future communication between two entities, at least one of whom has the ability to generate or acquire symmetric keys by themselves.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ indicates a restriction imposed as to the purposes for which, and the policies under which, the certified public key may be used.
A)Authority key identifier
B)Key usage
C)Subject key identifier
D)Certificate policies
A)Authority key identifier
B)Key usage
C)Subject key identifier
D)Certificate policies
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
__________ is an integer value unique within the issuing CA that is unambiguously associated with this certificate.
A)Signature identifier
B)Version
C)Serial number
D)Issuer unique identifier
A)Signature identifier
B)Version
C)Serial number
D)Issuer unique identifier
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
the principal objective for developing a __________ is to enable secure, convenient, and efficient acquisition of public keys.
A)KtC
B)CRL
C)PKI
D)KDC
A)KtC
B)CRL
C)PKI
D)KDC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
the __________ identifies the public key to be used to verify the signature on this certificate or CRL.
A)authority key identifier
B)policy constraints
C)issuer name
D)directory
A)authority key identifier
B)policy constraints
C)issuer name
D)directory
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
Several techniques have been proposed for the distribution of public keys.the proposals can be grouped into the following four general schemes: public announcement, publicly available directory, public-key certificates, and ____________.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
A __________ generates and distributes session keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
Several techniques have been proposed for the distribution of public keys.the four proposals mentioned and discussed in the textbook are: Public announcement, Publicly available directory, Public-key authority, and _______ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
One of the most important uses of a __________ cryptosystem is to encrypt secret keys for distribution.
A)master key
B)KDC
C)public key
D)end-to-end
A)master key
B)KDC
C)public key
D)end-to-end
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
__________ is the process of administering or managing cryptographic keys for a cryptographic system.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
A __________ attack is when a protocol is insecure against an adversary who can intercept messages and can either relay the intercepted message or substitute another message.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
If encryption is done at the __________ level a key is needed for every pair of users or processes that require communication.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
the strength of any cryptographic system rests with the ___________ .
A)end encryption
B)key distribution technique
C)nonce
D)X.509 certificate
A)end encryption
B)key distribution technique
C)nonce
D)X.509 certificate
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
the heart of the X.509 scheme is the __________ certificate associate with each user.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
the _________ can be an end user; a device such as a router or server; a process; or any item that can be identified in the subject name of a public key certificate.
A)repository
B)certification authority
C)end entity
D)registration authority
A)repository
B)certification authority
C)end entity
D)registration authority
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
X.509 is based on the use of public-key cryptography and __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
If __________ is done at a network or IP level a key is needed for each pair of hosts on the network that wish to communicate.
A)end-to-end encryption
B)key management
C)key distribution
D)link encryption
A)end-to-end encryption
B)key management
C)key distribution
D)link encryption
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
the principal objective for developing a _________ is to enable secure, convenient and efficient acquisition of public keys.
A)KDC
B)IEtF
C)PKI
D)CRL
A)KDC
B)IEtF
C)PKI
D)CRL
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
If A and B each has an encrypted connection to a third party C, C can deliver a key on the encrypted links to A and
B.A _________ center is responsible for distributing keys to pairs of users as needed.
B.A _________ center is responsible for distributing keys to pairs of users as needed.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
A _________ is any method for storing and retrieving PKI-related information, such as public key certificates and CRLs.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
A __________ consists of a public key, an identifier of the key owner, and the whole block signed by a trusted third party and can be used by participants to exchange keys without contacting a public key authority in a way that is as reliable as if the keys were obtained directly from a public key authority.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
A __________ is defined as a set of policies, processes, server platforms, software, and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
the __________ is an authority trusted by one or more users to create and assign public key certificates.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
the certificate extensions fall into three main categories: key and policy information, __________ , and certification path constraints.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck