Deck 2: Cryptographic Tools

Full screen (f)
exit full mode
Question
An important element in many computer security services and
applications is the use of cryptographic algorithms.
Use Space or
up arrow
down arrow
to flip the card.
Question
On average,__________ of all possible keys must be tried in order to achieve success with a brute-force attack.

A)one-fourth
B)half
C)two-thirds
D)three-fourths
Question
__________ is the scrambled message produced as output.

A)Plaintext
B)Ciphertext
C)Secret key
D)Cryptanalysis
Question
Symmetric encryption is used primarily to provide confidentiality.
Question
Cryptanalytic attacks try every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained.
Question
Two of the most important applications of public-key encryption are
digital signatures and key management.
Question
Some form of protocol is needed for public-key distribution.
Question
Modes of operation are the alternative techniques that have been
developed to increase the security of symmetric block encryption for large sequences of data.
Question
Triple DES takes a plaintext block of 64 bits and a key of 56 bits to
produce a ciphertext block of 64 bits.
Question
T F 4.The secret key is input to the encryption algorithm.
Question
Public-key algorithms are based on simple operations on bit patterns.
Question
The advantage of a stream cipher is that you can reuse keys.
Question
A message authentication code is a small block of data generated by a
secret key and appended to a message.
Question
T F 13.The purpose of the DSS algorithm is to enable two users to securely
reach agreement about a shared secret that can be used as a secret key
for subsequent symmetric encryption of messages.
Question
Public-key cryptography is asymmetric.
Question
The strength of a hash function against brute-force attacks depends
solely on the length of the hash code produced by the algorithm.
Question
The original message or data that is fed into the algorithm is __________.

A)encryption algorithm
B)secret key
C)decryption algorithm
D)plaintext
Question
Like the MAC,a hash function also takes a secret key as input.
Question
The __________ is the encryption algorithm run in reverse.

A)decryption algorithm
B)plaintext
C)ciphertext
D)encryption algorithm
Question
The most important symmetric algorithms,all of which are block ciphers,are the DES,triple DES,and the __________.

A)SHA
B)RSA
C)AES
D)DSS
Question
Digital signatures and key management are the two most important applications of __________ encryption.

A)private-key
B)public-key
C)preimage resistant
D)advanced
Question
Public-key encryption was first publicly proposed by __________ in 1976.
Question
__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

A)Cryptanalysis
B)Decryption
C)Message authentication
D)Collision resistance
Question
Transmitted data stored locally are referred to as __________ .

A)ciphertext
B)DES
C)data at rest
D)ECC
Question
A _________ protects against an attack in which one party generates a message for another party to sign.

A)data authenticator
B)strong hash function
C)weak hash function
D)digital signature
Question
A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

A)mode of operation
B)hash function
C)cryptanalysis
D)brute-force attack
Question
There are two general approaches to attacking a symmetric encryption scheme:
cryptanalytic attacks and __________ attacks.
Question
A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
Question
The __________ algorithm takes the ciphertext and the secret key and produces
the original plaintext.
Question
The two criteria used to validate that a sequence of numbers is random are independence and _________ .
Question
A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.
Question
Combined one byte at a time with the plaintext stream using the XOR operation,a __________ is the output of the pseudorandom bit generator.

A)keystream
B)digital signature
C)secure hash
D)message authentication code
Question
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.

A)digital signature
B)keystream
C)one way hash function
D)secret key
Question
In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.
Question
Also referred to as single-key encryption,the universal technique for providing confidentiality for transmitted or stored data is __________ .
Question
__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.

A)DSS
B)RSA
C)SHA
D)AES
Question
A __________ processes the input elements continuously,producing output one element at a time.
Question
The purpose of a __________ is to produce a "fingerprint" of a file,message,or other block of data.

A)secret key
B)digital signature
C)keystream
D)hash function
Question
A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.
Question
If the only form of attack that could be made on an encryption algorithm is brute-force,then the way to counter such attacks would be to __________ .

A)use longer keys
B)use shorter keys
C)use more keys
D)use less keys
Question
A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.
Question
__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.
Question
The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.
Question
The simplest approach to multiple block encryption is known as __________ mode,in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.
Question
The __________ is a pair of keys that have been selected so that if one is used for encryption,the other is used for decryption.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/45
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Cryptographic Tools
1
An important element in many computer security services and
applications is the use of cryptographic algorithms.
True
2
On average,__________ of all possible keys must be tried in order to achieve success with a brute-force attack.

A)one-fourth
B)half
C)two-thirds
D)three-fourths
B
3
__________ is the scrambled message produced as output.

A)Plaintext
B)Ciphertext
C)Secret key
D)Cryptanalysis
B
4
Symmetric encryption is used primarily to provide confidentiality.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
5
Cryptanalytic attacks try every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
6
Two of the most important applications of public-key encryption are
digital signatures and key management.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
7
Some form of protocol is needed for public-key distribution.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
8
Modes of operation are the alternative techniques that have been
developed to increase the security of symmetric block encryption for large sequences of data.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
9
Triple DES takes a plaintext block of 64 bits and a key of 56 bits to
produce a ciphertext block of 64 bits.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
10
T F 4.The secret key is input to the encryption algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
11
Public-key algorithms are based on simple operations on bit patterns.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
12
The advantage of a stream cipher is that you can reuse keys.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
13
A message authentication code is a small block of data generated by a
secret key and appended to a message.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
14
T F 13.The purpose of the DSS algorithm is to enable two users to securely
reach agreement about a shared secret that can be used as a secret key
for subsequent symmetric encryption of messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
15
Public-key cryptography is asymmetric.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
16
The strength of a hash function against brute-force attacks depends
solely on the length of the hash code produced by the algorithm.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
17
The original message or data that is fed into the algorithm is __________.

A)encryption algorithm
B)secret key
C)decryption algorithm
D)plaintext
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
18
Like the MAC,a hash function also takes a secret key as input.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
19
The __________ is the encryption algorithm run in reverse.

A)decryption algorithm
B)plaintext
C)ciphertext
D)encryption algorithm
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
20
The most important symmetric algorithms,all of which are block ciphers,are the DES,triple DES,and the __________.

A)SHA
B)RSA
C)AES
D)DSS
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
21
Digital signatures and key management are the two most important applications of __________ encryption.

A)private-key
B)public-key
C)preimage resistant
D)advanced
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
22
Public-key encryption was first publicly proposed by __________ in 1976.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
23
__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

A)Cryptanalysis
B)Decryption
C)Message authentication
D)Collision resistance
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
24
Transmitted data stored locally are referred to as __________ .

A)ciphertext
B)DES
C)data at rest
D)ECC
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
25
A _________ protects against an attack in which one party generates a message for another party to sign.

A)data authenticator
B)strong hash function
C)weak hash function
D)digital signature
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
26
A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

A)mode of operation
B)hash function
C)cryptanalysis
D)brute-force attack
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
27
There are two general approaches to attacking a symmetric encryption scheme:
cryptanalytic attacks and __________ attacks.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
28
A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
29
The __________ algorithm takes the ciphertext and the secret key and produces
the original plaintext.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
30
The two criteria used to validate that a sequence of numbers is random are independence and _________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
31
A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
32
Combined one byte at a time with the plaintext stream using the XOR operation,a __________ is the output of the pseudorandom bit generator.

A)keystream
B)digital signature
C)secure hash
D)message authentication code
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
33
A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.

A)digital signature
B)keystream
C)one way hash function
D)secret key
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
34
In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
35
Also referred to as single-key encryption,the universal technique for providing confidentiality for transmitted or stored data is __________ .
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
36
__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.

A)DSS
B)RSA
C)SHA
D)AES
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
37
A __________ processes the input elements continuously,producing output one element at a time.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
38
The purpose of a __________ is to produce a "fingerprint" of a file,message,or other block of data.

A)secret key
B)digital signature
C)keystream
D)hash function
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
39
A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
40
If the only form of attack that could be made on an encryption algorithm is brute-force,then the way to counter such attacks would be to __________ .

A)use longer keys
B)use shorter keys
C)use more keys
D)use less keys
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
41
A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
42
__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
43
The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
44
The simplest approach to multiple block encryption is known as __________ mode,in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
45
The __________ is a pair of keys that have been selected so that if one is used for encryption,the other is used for decryption.
Unlock Deck
Unlock for access to all 45 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 45 flashcards in this deck.