Deck 2: Symmetric Encryption and Message Confidentiality

Full screen (f)
exit full mode
Question
The _________ algorithm takes the ciphertext and the same secret key and produces the original plaintext.
Use Space or
up arrow
down arrow
to flip the card.
Question
The security of symmetric encryption depends on the secrecy of the algorithm, not the secrecy of the key.
Question
The primary advantage of a stream cipher is that stream ciphers are almost always faster and use far less code than do block ciphers.
Question
Smaller block sizes mean greater security but reduced encryption/decryption speed.
Question
Triple DES was first standardized for use in financial applications in ANSI standard X9.17 in 1985.
Question
An encryption scheme is __________ if the cost of breaking the cipher exceeds the value of the encrypted information and/or the time required to break the cipher exceeds the useful lifetime of the information.
Question
With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the _________ .
Question
The Feistel structure is a particular example of the more general structure used by all symmetric block ciphers.
Question
Public-key encryption is also referred to as conventional encryption, secret-key, or single-key encryption.
Question
The ciphertext-only attack is the easiest to defend against because the opponent has the least amount of information to work with.
Question
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: Asymmetric ciphers, Hash functions and message authentication codes, and ___________ .
Question
Random numbers play an important role in the use of encryption for various network security applications.
Question
Ciphertext is the scrambled message produced as output.
Question
The most commonly used symmetric encryption algorithms are stream ciphers.
Question
The essence of a symmetric block cipher is that a single round offers inadequate security but that multiple rounds offer increasing security.
Question
The principal drawback of 3DES is that the algorithm is relatively sluggish in software.
Question
The advantage of a block cipher is that you can reuse keys.
Question
AES uses a Feistel structure.
Question
The process of attempting to discover the plaintext or key is known as _________ .
Question
A _________ cipher processes the plaintext input in fixed sized blocks and produces a block of ciphertext of equal size for each plaintext block.
Question
In the _________ mode the input to the encryption algorithm is the XOR of the current plaintext block and the preceeding ciphertext block; the same key is used for each block.
Question
The three most important symmetric block ciphers are: triple DES (3DES), the Advanced Encryption Standard (AES), and the ___________ .
Question
All encryption algorithms are based on two general principles: _________, in which each element in the plaintext is mapped into another element, and transposition, in which elements in the plaintext are rearranged.
Question
Many symmetric block encryption algorithms including DES have a structure first described by _________ of IBM in 1973.
Question
__________ is a stream cipher used in the Secure Sockets Layer/Transport Layer Security standards that have been defined for communication between Web browsers and servers and is also used in WEP and WPA protocols.
Question
The ________ source is drawn from the physical environment of the computer and could include things such as keystroke timing patterns, disk electrical activity, mouse movements, and instantaneous values of the system clock.
Question
Two requirements for secure use of symmetric encryption are: sender and receiver must have obtained copies of the secret key in a secure fashion and a strong __________ is needed.
Question
A PRNG takes as input a fixed value called the ________ and produces a sequence of output bits using a deterministic algorithm.
Question
Also referred to as conventional encryption, secret-key, or single-key encryption, _________ encryption was the only type of encryption in use prior to the development of public-key encryption in the late 1970's.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/29
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Symmetric Encryption and Message Confidentiality
1
The _________ algorithm takes the ciphertext and the same secret key and produces the original plaintext.
decryption
2
The security of symmetric encryption depends on the secrecy of the algorithm, not the secrecy of the key.
False
3
The primary advantage of a stream cipher is that stream ciphers are almost always faster and use far less code than do block ciphers.
True
4
Smaller block sizes mean greater security but reduced encryption/decryption speed.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
5
Triple DES was first standardized for use in financial applications in ANSI standard X9.17 in 1985.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
6
An encryption scheme is __________ if the cost of breaking the cipher exceeds the value of the encrypted information and/or the time required to break the cipher exceeds the useful lifetime of the information.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
7
With the use of symmetric encryption, the principal security problem is maintaining the secrecy of the _________ .
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
8
The Feistel structure is a particular example of the more general structure used by all symmetric block ciphers.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
9
Public-key encryption is also referred to as conventional encryption, secret-key, or single-key encryption.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
10
The ciphertext-only attack is the easiest to defend against because the opponent has the least amount of information to work with.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
11
Three broad categories of cryptographic algorithms are commonly used to create PRNGs: Asymmetric ciphers, Hash functions and message authentication codes, and ___________ .
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
12
Random numbers play an important role in the use of encryption for various network security applications.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
13
Ciphertext is the scrambled message produced as output.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
14
The most commonly used symmetric encryption algorithms are stream ciphers.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
15
The essence of a symmetric block cipher is that a single round offers inadequate security but that multiple rounds offer increasing security.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
16
The principal drawback of 3DES is that the algorithm is relatively sluggish in software.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
17
The advantage of a block cipher is that you can reuse keys.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
18
AES uses a Feistel structure.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
19
The process of attempting to discover the plaintext or key is known as _________ .
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
20
A _________ cipher processes the plaintext input in fixed sized blocks and produces a block of ciphertext of equal size for each plaintext block.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
21
In the _________ mode the input to the encryption algorithm is the XOR of the current plaintext block and the preceeding ciphertext block; the same key is used for each block.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
22
The three most important symmetric block ciphers are: triple DES (3DES), the Advanced Encryption Standard (AES), and the ___________ .
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
23
All encryption algorithms are based on two general principles: _________, in which each element in the plaintext is mapped into another element, and transposition, in which elements in the plaintext are rearranged.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
24
Many symmetric block encryption algorithms including DES have a structure first described by _________ of IBM in 1973.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
25
__________ is a stream cipher used in the Secure Sockets Layer/Transport Layer Security standards that have been defined for communication between Web browsers and servers and is also used in WEP and WPA protocols.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
26
The ________ source is drawn from the physical environment of the computer and could include things such as keystroke timing patterns, disk electrical activity, mouse movements, and instantaneous values of the system clock.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
27
Two requirements for secure use of symmetric encryption are: sender and receiver must have obtained copies of the secret key in a secure fashion and a strong __________ is needed.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
28
A PRNG takes as input a fixed value called the ________ and produces a sequence of output bits using a deterministic algorithm.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
29
Also referred to as conventional encryption, secret-key, or single-key encryption, _________ encryption was the only type of encryption in use prior to the development of public-key encryption in the late 1970's.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 29 flashcards in this deck.