Solved

Match Each Item with a Statement Below

Question 1

Matching

Match each item with a statement below:

Premises:
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
identifies a specific entity as the source or origin of a given piece of data
takes the original data, divides it into digits, and encrypts each digit one at a time
traditional technique for detecting if data inadvertently changes during transmission
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
a fixed-size checksum created by cryptographic hash functions
Responses:
Data origin authentication
Snooping
Digital signature algorithm (DSA)
Message digest
Entity authentication
Stream cipher
Block cipher
Replay attack
Checksum

Correct Answer:

takes the original data, divides it into digits, and encrypts each digit one at a time
Stream cipher
identifies a specific entity as the source or origin of a given piece of data
Data origin authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Entity authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Snooping
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Digital signature algorithm (DSA)
traditional technique for detecting if data inadvertently changes during transmission
Checksum
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Replay attack
a fixed-size checksum created by cryptographic hash functions
Message digest
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Block cipher
Related Questions