Deck 6: Encryption and Password Cracking

Full screen (f)
exit full mode
Question
Transposition relies on length of password.
Use Space or
up arrow
down arrow
to flip the card.
Question
Block ciphers operate on blocks of data.
Question
As might be expected,Triple DES is almost three times faster than DES.
Question
DSS stands for the United States government's Digital Signature Standard, which is based on the Digital Signature Algorithm (DSA).
Question
Whether or not encryption is used, the use of password protection is open to various kinds of attack.
Question
____ is a change in the position or order of letters or words, as in an anagram.

A)Exchange
B)Substitution
C)Transposition
D)Diffusion
Question
____ is the replacement of a letter or group of letters with another letter or group of letters.

A)Substitution
B)Diffusion
C)Exchange
D)Transposition
Question
____ ciphers use a key stream to encrypt and decrypt a plaintext message.

A)Block
B)Bit
C)Packet
D)Stream
Question
____ is a method for secure key exchange over an insecure channel based on the nature of photons.

A)Skipjack
B)Quantum cryptography
C)RC4
D)IDEA
Question
____ attacks use all possible combination of letters, numbers, and special characters to determine the target password.

A)Brute-force
B)Dictionary
C)Hybridization
D)LC5
Question
____________________ uses an algorithm to encrypt a ciphertext document from a plaintext document, and when the information is needed again, the algorithm is used to decrypt the ciphertext back into plaintext.
Question
Sometimes called secret key algorithms, ____________________ key algorithms use the same key to encrypt and to decrypt the data.
Question
Also called public key algorithms, ____________________ key algorithms use two keys for encrypting and decrypting data.
Question
The ____________________, also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government.
Question
____________________ is a secure hash algorithm developed in 1992 by Ron Rivest,one of the inventors of RSA.
Question
Briefly describe Enigma.
Question
Describe some of the most common terms you need to know when dealing with cryptography.
Question
Briefly describe 3DES.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Encryption and Password Cracking
1
Transposition relies on length of password.
False
2
Block ciphers operate on blocks of data.
True
3
As might be expected,Triple DES is almost three times faster than DES.
False
4
DSS stands for the United States government's Digital Signature Standard, which is based on the Digital Signature Algorithm (DSA).
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Whether or not encryption is used, the use of password protection is open to various kinds of attack.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
____ is a change in the position or order of letters or words, as in an anagram.

A)Exchange
B)Substitution
C)Transposition
D)Diffusion
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
____ is the replacement of a letter or group of letters with another letter or group of letters.

A)Substitution
B)Diffusion
C)Exchange
D)Transposition
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
____ ciphers use a key stream to encrypt and decrypt a plaintext message.

A)Block
B)Bit
C)Packet
D)Stream
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
____ is a method for secure key exchange over an insecure channel based on the nature of photons.

A)Skipjack
B)Quantum cryptography
C)RC4
D)IDEA
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
____ attacks use all possible combination of letters, numbers, and special characters to determine the target password.

A)Brute-force
B)Dictionary
C)Hybridization
D)LC5
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
____________________ uses an algorithm to encrypt a ciphertext document from a plaintext document, and when the information is needed again, the algorithm is used to decrypt the ciphertext back into plaintext.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
Sometimes called secret key algorithms, ____________________ key algorithms use the same key to encrypt and to decrypt the data.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
Also called public key algorithms, ____________________ key algorithms use two keys for encrypting and decrypting data.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
The ____________________, also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
____________________ is a secure hash algorithm developed in 1992 by Ron Rivest,one of the inventors of RSA.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
Briefly describe Enigma.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
Describe some of the most common terms you need to know when dealing with cryptography.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
Briefly describe 3DES.
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.