Deck 5: Basic Cryptography
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
Play
Full screen (f)
Deck 5: Basic Cryptography
1
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
A)Substitution
B)Block
C)Loop
D)Sponge
A)Substitution
B)Block
C)Loop
D)Sponge
D
2
A Hardware Security Module (HSM) is essentially a chip on the motherboard of the computer that provides cryptographic services.
False
3
The asymmetric cryptography algorithm most commonly used is:
A)AES
B)RSA
C)Twofish
D)Blowfish
A)AES
B)RSA
C)Twofish
D)Blowfish
B
4
A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:
A)RSA
B)SHA1
C)MD5
D)MD2
A)RSA
B)SHA1
C)MD5
D)MD2
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A block cipher works on a single character at a time, and is faster than a stream cipher.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?
A)GPG
B)OGP
C)CGP
D)GPP
A)GPG
B)OGP
C)CGP
D)GPP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
A)AES
B)Twofish
C)3DES
D)RSA
A)AES
B)Twofish
C)3DES
D)RSA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?
A)Reactive cryptography
B)Symmetric cryptography
C)Analog cryptography
D)Quantum cryptography
A)Reactive cryptography
B)Symmetric cryptography
C)Analog cryptography
D)Quantum cryptography
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?
A)Confidentiality
B)Availability
C)Encryption
D)Integrity
A)Confidentiality
B)Availability
C)Encryption
D)Integrity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is not one of the functions of a digital signature?
A)Verification of the sender
B)Prevention of the sender from disowning the message
C)Prove the integrity of the message
D)Protect the public key
A)Verification of the sender
B)Prevention of the sender from disowning the message
C)Prove the integrity of the message
D)Protect the public key
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?
A)RSA
B)AES
C)Blowfish
D)3DES
A)RSA
B)AES
C)Blowfish
D)3DES
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
A)shift
B)substitution
C)lock
D)loop
A)shift
B)substitution
C)lock
D)loop
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?
A)FCC
B)RSA
C)ECC
D)IKE
A)FCC
B)RSA
C)ECC
D)IKE
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Data that is in an unencrypted form is referred to as which of the following?
A)Plaintext
B)Plain text
C)Simpletext
D)Cleartext
A)Plaintext
B)Plain text
C)Simpletext
D)Cleartext
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
What type of cryptography uses two keys instead of just one, generating both a private and a public key?
A)Symmetric
B)Asymmetric
C)Shared
D)Open
A)Symmetric
B)Asymmetric
C)Shared
D)Open
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?
A)Twofish
B)Blowfish
C)Whirlpool
D)Rijndal
A)Twofish
B)Blowfish
C)Whirlpool
D)Rijndal
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
If using the MD5 hashing algorithm, what is the length to which each message is padded?
A)32 bits
B)64 bits
C)128 bits
D)512 bits
A)32 bits
B)64 bits
C)128 bits
D)512 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
Match the following terms to the appropriate definitions.
Match the following terms to the appropriate definitions.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An algorithm that takes one character and replaces it with one character.
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An algorithm that takes one character and replaces it with one character.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A temporary key that is used only once before it is discarded.
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A temporary key that is used only once before it is discarded.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A key that is generated by a symmetric cryptographic algorithm is said to be a:
A)private key
B)public key
C)symmetric key
D)shared key
A)private key
B)public key
C)symmetric key
D)shared key
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data?
A)hash
B)key
C)digest
D)block
A)hash
B)key
C)digest
D)block
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A cipher that manipulates an entire block of plaintext at one time.
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A cipher that manipulates an entire block of plaintext at one time.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
On what principle did Julius Caesar's cryptographic messages function?
A)Each alphabetic letter was replaced by a corresponding number
B)Each alphabetic letter was represented by a seemingly random symbol
C)Each alphabetic letter was shifted three places down in the alphabet
D)Each alphabetic letter was shifted 5 places up in the alphabet.
A)Each alphabetic letter was replaced by a corresponding number
B)Each alphabetic letter was represented by a seemingly random symbol
C)Each alphabetic letter was shifted three places down in the alphabet
D)Each alphabetic letter was shifted 5 places up in the alphabet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The SHA-1 hashing algorithm creates a digest that is how many bits in length?
A)96 bits
B)128 bits
C)160 bits
D)192 bits
A)96 bits
B)128 bits
C)160 bits
D)192 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:
A)AES
B)3DES
C)RSA
D)Twofish
A)AES
B)3DES
C)RSA
D)Twofish
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?
A)matrix-based
B)lattice-based
C)linear
D)quantum
A)matrix-based
B)lattice-based
C)linear
D)quantum
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A ________________ involves combining plaintext with a random key to create ciphertext that cannot be broken mathematically.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An algorithm that uses elliptic curves instead of prime numbers to compute keys
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An algorithm that uses elliptic curves instead of prime numbers to compute keys
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The Data Encryption Standard is a(n) ______________ cipher.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An asymmetric encryption key that does not have to be protected.
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An asymmetric encryption key that does not have to be protected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An asymmetric encryption key that does have to be protected.
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An asymmetric encryption key that does have to be protected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the RIPEMD hash.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Explain hashing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How can steganography be used to hide information in something other than images?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe how Message Digest2 (MD2) works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe hard disk drive encryption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Discuss how cryptography can help ensure the availability of the data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
Data that has been encrypted.
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
Data that has been encrypted.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List and describe the characteristics a hashing algorithm must have to be considered secure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss how HMAC works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe how a block cipher works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck