Matching
Match each item with a statement below:
Premises:
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
identifies a specific entity as the source or origin of a given piece of data
takes the original data, divides it into digits, and encrypts each digit one at a time
traditional technique for detecting if data inadvertently changes during transmission
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
a fixed-size checksum created by cryptographic hash functions
Responses:
Data origin authentication
Snooping
Digital signature algorithm (DSA)
Message digest
Entity authentication
Stream cipher
Block cipher
Replay attack
Checksum
Correct Answer:
Premises:
Responses:
takes the original data, divides it into digits, and encrypts each digit one at a time
Stream cipher
identifies a specific entity as the source or origin of a given piece of data
Data origin authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Entity authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Snooping
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Digital signature algorithm (DSA)
traditional technique for detecting if data inadvertently changes during transmission
Checksum
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Replay attack
a fixed-size checksum created by cryptographic hash functions
Message digest
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Block cipher
Premises:
takes the original data, divides it into digits, and encrypts each digit one at a time
identifies a specific entity as the source or origin of a given piece of data
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
traditional technique for detecting if data inadvertently changes during transmission
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
a fixed-size checksum created by cryptographic hash functions
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Responses:
Stream cipher
Data origin authentication
Entity authentication
Snooping
Digital signature algorithm (DSA)
Checksum
Replay attack
Message digest
Block cipher
Related Questions
Q2: Describe the meet-in-the-middle attack.
Q3: Describe a block cipher counter (CTR) mode
Q4: _ means people who know each other
Q5: Describe the main characteristics of symmetric key
Q6: _ occurs when an attacker maliciously changes
Q7: DES is considered weak by today's standards
Q8: The security of the RSA algorithm depends
Q9: What are the main characteristics of AES?
Q10: What are the differences between dictionary and
Q11: Symmetric key encryptions ensure confidentiality and data