Deck 1: Introduction to Security Concepts

Full screen (f)
exit full mode
Question
2)Encryption always ensures data integrity.
Use Space or
up arrow
down arrow
to flip the card.
Question
17)DSA was standardized as a federal information processing standard (____) called the digital signature standard (DSS).

A) FIPS-086
B) FIPS-112
C) FIPS-156
D) FIPS-186
Question
12)Symmetric key encryptions ensure confidentiality and data ____.

A) integrity
B) privacy
C) availability
D) repudiation
Question
4)DES is considered weak by today's standards due to the fact that the key size is only 56 bits.
Question
10)A(n) ____ uses a keystream composed of completely random digits.

A) XOR pad
B) block cipher
C) keystream cipher
D) one-time pad
Question
18)____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.

A) Brute force
B) Dictionary attack
C) Meet-in-the-middle
D) Man-in-the-middle
Question
20)A digital certificate is standardized as ____ under IETF RFC 2459.

A) X.501
B) X.509
C) X.512
D) X.529
Question
6)A(n) ____ is the unique string of numbers that identifies a computer or server on the Internet.

A) IP address
B) ARP address
C) MAC address
D) DN
Question
13)Schemes that involve hashing with secret keys are called ____ or keyed hashes.

A) MACs
B) checksums
C) parity bits
D) parity keys
Question
1)A software system is only as secure as its weakest link.
Question
8)____ occurs when an attacker maliciously changes data in transit or in a medium.

A) Spoofing
B) Tampering
C) Replay attack
D) Snooping
Question
19)A ____ is a piece of structured data that uses a digital signature to bind a public key with an identity.

A) private key certificate
B) private key signature
C) public key signature
D) public key certificate
Question
7)In ____, the source IP address in a packet is faked to make recipients suppose that packets are coming from trustworthy IP addresses.

A) tampering
B) snooping
C) sniffing
D) spoofing
Question
5)A common use for cryptographic hash functions is to provide password-storage solutions.
Question
16)____ ensure(s) the integrity of a message sent between two parties who are unknown to each other.

A) 3DES-EDE
B) Digital signatures
C) Symmetric encryption
D) Block ciphers
Question
14)____ is defined as the exchange of information over an unsecured medium that allows each of two parties, the sender and the recipient, to compute a value that will be used to construct a secret key for a symmetric cipher during the rest of the communication.

A) Message authentication code
B) Digital certificate
C) Key agreement
D) Keyed hashes
Question
3)Parallel encryption is possible with a block cipher operating in CFB mode.
Question
11)____ was designed by IBM in the 1970s and is the most widely used symmetric cipher.

A) RC4
B) RC5
C) DES
D) AES
Question
9)The two primary types of symmetric ciphers are stream ciphers and ____ ciphers.

A) bit
B) character
C) block
D) byte
Question
15)The security of the RSA algorithm depends on two mathematic problems: the problem of factoring very large numbers, p and q , and the ____ problem.

A) RSA
B) ElGamal
C) Diffie-Hellman
D) discrete logarithm
Question
23)____ was originally designed as part of the International Telecommunication Union's Open Standards Interconnect (OSI) effort as a general description language for the OSI protocol.

A) PKCS
B) OID
C) ASN.1
D) ASCII
Question
27)____________________ means the assurance of data privacy-ensuring that no one can read the data except for the specific entity or entities intended.
Question
25)____s are used for naming almost every object type in X.509 certificates such as components of distinguished names, extensions, and so on.

A) OID
B) ASN.1
C) PKCS
D) Base64
Question
24)____ encoding literally means a positional numbering system using a base of 64.

A) ASN.1
B) Base64
C) OID
D) PKCS#64
Question
40)What are the prerequisites for a hash function to be classified as a secure cryptographic hash function?
Question
21)____ means people who know each other can securely send messages to their friends.

A) Certificate Authority
B) PKI
C) Web of trust
D) Digital ring
Question
30)A(n) ____________________ attack is a form of cryptanalysis that presumes that the attacker is able to choose arbitrary plaintexts to be encrypted, in effect obtaining the corresponding ciphertexts.
Question
37)Describe a block cipher counter (CTR) mode of operation.
Question
41)What information does a certificate contain?
Question
34)What are the main advantages and disadvantages of Electronic Codebook (ECB)?
Question
29)____________________ is the assurance of nonalteration, meaning that the data either in transit or in storage has not been tampered.
Question
39)What are the main characteristics of AES?
Question
22)____ is a set of computer networking standards developed by the International Standard Organization (ISO) and covering electronic directory services.

A) ASCII
B) ASN.1
C) PKCS
D) X.500
Question
36)Describe the CBC rollover problem.
Question
28)____________________ is the assurance that an entity is who it claims to be.
Question
31)For communication among former unknown parties, ____________________ refers to any method for distributing a secret amongst a group of participants in cryptography.
Question
35)What are the differences between dictionary and brute-force attacks?
Question
26)The company RSA Data Security initially published ____ to promote and facilitate the use of public key techniques.

A) ASN.1
B) Base64
C) PKCS
D) OID
Question
33)Describe the main characteristics of symmetric key encryption.
Question
38)Describe the meet-in-the-middle attack.
Question
Match between columns
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Digital signature algorithm (DSA)
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Replay attack
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Checksum
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Block cipher
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Message digest
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Data origin authentication
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Stream cipher
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Snooping
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Entity authentication
identifies a specific entity as the source or origin of a given piece of data
Digital signature algorithm (DSA)
identifies a specific entity as the source or origin of a given piece of data
Replay attack
identifies a specific entity as the source or origin of a given piece of data
Checksum
identifies a specific entity as the source or origin of a given piece of data
Block cipher
identifies a specific entity as the source or origin of a given piece of data
Message digest
identifies a specific entity as the source or origin of a given piece of data
Data origin authentication
identifies a specific entity as the source or origin of a given piece of data
Stream cipher
identifies a specific entity as the source or origin of a given piece of data
Snooping
identifies a specific entity as the source or origin of a given piece of data
Entity authentication
takes the original data, divides it into digits, and encrypts each digit one at a time
Digital signature algorithm (DSA)
takes the original data, divides it into digits, and encrypts each digit one at a time
Replay attack
takes the original data, divides it into digits, and encrypts each digit one at a time
Checksum
takes the original data, divides it into digits, and encrypts each digit one at a time
Block cipher
takes the original data, divides it into digits, and encrypts each digit one at a time
Message digest
takes the original data, divides it into digits, and encrypts each digit one at a time
Data origin authentication
takes the original data, divides it into digits, and encrypts each digit one at a time
Stream cipher
takes the original data, divides it into digits, and encrypts each digit one at a time
Snooping
takes the original data, divides it into digits, and encrypts each digit one at a time
Entity authentication
traditional technique for detecting if data inadvertently changes during transmission
Digital signature algorithm (DSA)
traditional technique for detecting if data inadvertently changes during transmission
Replay attack
traditional technique for detecting if data inadvertently changes during transmission
Checksum
traditional technique for detecting if data inadvertently changes during transmission
Block cipher
traditional technique for detecting if data inadvertently changes during transmission
Message digest
traditional technique for detecting if data inadvertently changes during transmission
Data origin authentication
traditional technique for detecting if data inadvertently changes during transmission
Stream cipher
traditional technique for detecting if data inadvertently changes during transmission
Snooping
traditional technique for detecting if data inadvertently changes during transmission
Entity authentication
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Digital signature algorithm (DSA)
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Replay attack
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Checksum
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Block cipher
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Message digest
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Data origin authentication
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Stream cipher
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Snooping
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Entity authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Digital signature algorithm (DSA)
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Replay attack
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Checksum
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Block cipher
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Message digest
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Data origin authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Stream cipher
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Snooping
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Entity authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Digital signature algorithm (DSA)
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Replay attack
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Checksum
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Block cipher
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Message digest
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Data origin authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Stream cipher
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Snooping
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Entity authentication
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Digital signature algorithm (DSA)
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Replay attack
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Checksum
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Block cipher
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Message digest
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Data origin authentication
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Stream cipher
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Snooping
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Entity authentication
a fixed-size checksum created by cryptographic hash functions
Digital signature algorithm (DSA)
a fixed-size checksum created by cryptographic hash functions
Replay attack
a fixed-size checksum created by cryptographic hash functions
Checksum
a fixed-size checksum created by cryptographic hash functions
Block cipher
a fixed-size checksum created by cryptographic hash functions
Message digest
a fixed-size checksum created by cryptographic hash functions
Data origin authentication
a fixed-size checksum created by cryptographic hash functions
Stream cipher
a fixed-size checksum created by cryptographic hash functions
Snooping
a fixed-size checksum created by cryptographic hash functions
Entity authentication
Question
What is the format of a X.500 distinguished name?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction to Security Concepts
1
2)Encryption always ensures data integrity.
False
2
17)DSA was standardized as a federal information processing standard (____) called the digital signature standard (DSS).

A) FIPS-086
B) FIPS-112
C) FIPS-156
D) FIPS-186
D
3
12)Symmetric key encryptions ensure confidentiality and data ____.

A) integrity
B) privacy
C) availability
D) repudiation
B
4
4)DES is considered weak by today's standards due to the fact that the key size is only 56 bits.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
10)A(n) ____ uses a keystream composed of completely random digits.

A) XOR pad
B) block cipher
C) keystream cipher
D) one-time pad
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
18)____ is the process of performing a comprehensive search on the possible solution space by throwing all computational power an attacker can gather at breaking the system.

A) Brute force
B) Dictionary attack
C) Meet-in-the-middle
D) Man-in-the-middle
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
20)A digital certificate is standardized as ____ under IETF RFC 2459.

A) X.501
B) X.509
C) X.512
D) X.529
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
6)A(n) ____ is the unique string of numbers that identifies a computer or server on the Internet.

A) IP address
B) ARP address
C) MAC address
D) DN
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
13)Schemes that involve hashing with secret keys are called ____ or keyed hashes.

A) MACs
B) checksums
C) parity bits
D) parity keys
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
1)A software system is only as secure as its weakest link.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
8)____ occurs when an attacker maliciously changes data in transit or in a medium.

A) Spoofing
B) Tampering
C) Replay attack
D) Snooping
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
19)A ____ is a piece of structured data that uses a digital signature to bind a public key with an identity.

A) private key certificate
B) private key signature
C) public key signature
D) public key certificate
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
7)In ____, the source IP address in a packet is faked to make recipients suppose that packets are coming from trustworthy IP addresses.

A) tampering
B) snooping
C) sniffing
D) spoofing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
5)A common use for cryptographic hash functions is to provide password-storage solutions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
16)____ ensure(s) the integrity of a message sent between two parties who are unknown to each other.

A) 3DES-EDE
B) Digital signatures
C) Symmetric encryption
D) Block ciphers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
14)____ is defined as the exchange of information over an unsecured medium that allows each of two parties, the sender and the recipient, to compute a value that will be used to construct a secret key for a symmetric cipher during the rest of the communication.

A) Message authentication code
B) Digital certificate
C) Key agreement
D) Keyed hashes
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
3)Parallel encryption is possible with a block cipher operating in CFB mode.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
11)____ was designed by IBM in the 1970s and is the most widely used symmetric cipher.

A) RC4
B) RC5
C) DES
D) AES
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
9)The two primary types of symmetric ciphers are stream ciphers and ____ ciphers.

A) bit
B) character
C) block
D) byte
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
15)The security of the RSA algorithm depends on two mathematic problems: the problem of factoring very large numbers, p and q , and the ____ problem.

A) RSA
B) ElGamal
C) Diffie-Hellman
D) discrete logarithm
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
23)____ was originally designed as part of the International Telecommunication Union's Open Standards Interconnect (OSI) effort as a general description language for the OSI protocol.

A) PKCS
B) OID
C) ASN.1
D) ASCII
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
27)____________________ means the assurance of data privacy-ensuring that no one can read the data except for the specific entity or entities intended.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
25)____s are used for naming almost every object type in X.509 certificates such as components of distinguished names, extensions, and so on.

A) OID
B) ASN.1
C) PKCS
D) Base64
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
24)____ encoding literally means a positional numbering system using a base of 64.

A) ASN.1
B) Base64
C) OID
D) PKCS#64
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
40)What are the prerequisites for a hash function to be classified as a secure cryptographic hash function?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
21)____ means people who know each other can securely send messages to their friends.

A) Certificate Authority
B) PKI
C) Web of trust
D) Digital ring
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
30)A(n) ____________________ attack is a form of cryptanalysis that presumes that the attacker is able to choose arbitrary plaintexts to be encrypted, in effect obtaining the corresponding ciphertexts.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
37)Describe a block cipher counter (CTR) mode of operation.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
41)What information does a certificate contain?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
34)What are the main advantages and disadvantages of Electronic Codebook (ECB)?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
29)____________________ is the assurance of nonalteration, meaning that the data either in transit or in storage has not been tampered.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
39)What are the main characteristics of AES?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
22)____ is a set of computer networking standards developed by the International Standard Organization (ISO) and covering electronic directory services.

A) ASCII
B) ASN.1
C) PKCS
D) X.500
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
36)Describe the CBC rollover problem.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
28)____________________ is the assurance that an entity is who it claims to be.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
31)For communication among former unknown parties, ____________________ refers to any method for distributing a secret amongst a group of participants in cryptography.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
35)What are the differences between dictionary and brute-force attacks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
26)The company RSA Data Security initially published ____ to promote and facilitate the use of public key techniques.

A) ASN.1
B) Base64
C) PKCS
D) OID
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
33)Describe the main characteristics of symmetric key encryption.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
38)Describe the meet-in-the-middle attack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Digital signature algorithm (DSA)
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Replay attack
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Checksum
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Block cipher
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Message digest
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Data origin authentication
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Stream cipher
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Snooping
when an attacker intercepts and records messages for sending at a later time, though the receiver thinks that the bogus traffic is legitimate
Entity authentication
identifies a specific entity as the source or origin of a given piece of data
Digital signature algorithm (DSA)
identifies a specific entity as the source or origin of a given piece of data
Replay attack
identifies a specific entity as the source or origin of a given piece of data
Checksum
identifies a specific entity as the source or origin of a given piece of data
Block cipher
identifies a specific entity as the source or origin of a given piece of data
Message digest
identifies a specific entity as the source or origin of a given piece of data
Data origin authentication
identifies a specific entity as the source or origin of a given piece of data
Stream cipher
identifies a specific entity as the source or origin of a given piece of data
Snooping
identifies a specific entity as the source or origin of a given piece of data
Entity authentication
takes the original data, divides it into digits, and encrypts each digit one at a time
Digital signature algorithm (DSA)
takes the original data, divides it into digits, and encrypts each digit one at a time
Replay attack
takes the original data, divides it into digits, and encrypts each digit one at a time
Checksum
takes the original data, divides it into digits, and encrypts each digit one at a time
Block cipher
takes the original data, divides it into digits, and encrypts each digit one at a time
Message digest
takes the original data, divides it into digits, and encrypts each digit one at a time
Data origin authentication
takes the original data, divides it into digits, and encrypts each digit one at a time
Stream cipher
takes the original data, divides it into digits, and encrypts each digit one at a time
Snooping
takes the original data, divides it into digits, and encrypts each digit one at a time
Entity authentication
traditional technique for detecting if data inadvertently changes during transmission
Digital signature algorithm (DSA)
traditional technique for detecting if data inadvertently changes during transmission
Replay attack
traditional technique for detecting if data inadvertently changes during transmission
Checksum
traditional technique for detecting if data inadvertently changes during transmission
Block cipher
traditional technique for detecting if data inadvertently changes during transmission
Message digest
traditional technique for detecting if data inadvertently changes during transmission
Data origin authentication
traditional technique for detecting if data inadvertently changes during transmission
Stream cipher
traditional technique for detecting if data inadvertently changes during transmission
Snooping
traditional technique for detecting if data inadvertently changes during transmission
Entity authentication
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Digital signature algorithm (DSA)
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Replay attack
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Checksum
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Block cipher
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Message digest
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Data origin authentication
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Stream cipher
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Snooping
divides data into blocks of a fixed length, often 64 or 128 bits, for cryptographic operations
Entity authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Digital signature algorithm (DSA)
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Replay attack
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Checksum
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Block cipher
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Message digest
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Data origin authentication
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Stream cipher
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Snooping
when an attacker monitors network traffic and records sensitive data such as user ID, passwords, accounts, or credit card numbers
Entity authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Digital signature algorithm (DSA)
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Replay attack
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Checksum
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Block cipher
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Message digest
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Data origin authentication
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Stream cipher
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Snooping
provides identification of the specific entity involved in isolation from any other activity that the entity might want to perform
Entity authentication
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Digital signature algorithm (DSA)
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Replay attack
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Checksum
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Block cipher
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Message digest
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Data origin authentication
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Stream cipher
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Snooping
the U.S. federal government standard for digital signatures, proposed by NIST in August 1991
Entity authentication
a fixed-size checksum created by cryptographic hash functions
Digital signature algorithm (DSA)
a fixed-size checksum created by cryptographic hash functions
Replay attack
a fixed-size checksum created by cryptographic hash functions
Checksum
a fixed-size checksum created by cryptographic hash functions
Block cipher
a fixed-size checksum created by cryptographic hash functions
Message digest
a fixed-size checksum created by cryptographic hash functions
Data origin authentication
a fixed-size checksum created by cryptographic hash functions
Stream cipher
a fixed-size checksum created by cryptographic hash functions
Snooping
a fixed-size checksum created by cryptographic hash functions
Entity authentication
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
What is the format of a X.500 distinguished name?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.