Deck 5: Basic Cryptography

Full screen (f)
exit full mode
Question
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

A)Substitution
B)Block
C)Loop
D)Sponge
Use Space or
up arrow
down arrow
to flip the card.
Question
A Hardware Security Module (HSM) is essentially a chip on the motherboard of the computer that provides cryptographic services.
Question
The asymmetric cryptography algorithm most commonly used is:

A)AES
B)RSA
C)Twofish
D)Blowfish
Question
A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.
Question
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

A)RSA
B)SHA1
C)MD5
D)MD2
Question
A block cipher works on a single character at a time, and is faster than a stream cipher.
Question
What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?

A)GPG
B)OGP
C)CGP
D)GPP
Question
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

A)AES
B)Twofish
C)3DES
D)RSA
Question
Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?

A)Reactive cryptography
B)Symmetric cryptography
C)Analog cryptography
D)Quantum cryptography
Question
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

A)Confidentiality
B)Availability
C)Encryption
D)Integrity
Question
Which of the following is not one of the functions of a digital signature?

A)Verification of the sender
B)Prevention of the sender from disowning the message
C)Prove the integrity of the message
D)Protect the public key
Question
Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.
Question
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?

A)RSA
B)AES
C)Blowfish
D)3DES
Question
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
Question
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

A)shift
B)substitution
C)lock
D)loop
Question
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

A)FCC
B)RSA
C)ECC
D)IKE
Question
Data that is in an unencrypted form is referred to as which of the following?

A)Plaintext
B)Plain text
C)Simpletext
D)Cleartext
Question
What type of cryptography uses two keys instead of just one, generating both a private and a public key?

A)Symmetric
B)Asymmetric
C)Shared
D)Open
Question
What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?

A)Twofish
B)Blowfish
C)Whirlpool
D)Rijndal
Question
If using the MD5 hashing algorithm, what is the length to which each message is padded?

A)32 bits
B)64 bits
C)128 bits
D)512 bits
Question
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
​Match the following terms to the appropriate definitions.​
Question
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An algorithm that takes one character and replaces it with one character.
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A temporary key that is used only once before it is discarded.​
Question
A key that is generated by a symmetric cryptographic algorithm is said to be a:

A)private key
B)public key
C)symmetric key
D)shared key
Question
What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data?

A)hash
B)key
C)digest
D)block
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A cipher that manipulates an entire block of plaintext at one time.​
Question
On what principle did Julius Caesar's cryptographic messages function?

A)Each alphabetic letter was replaced by a corresponding number
B)Each alphabetic letter was represented by a seemingly random symbol
C)Each alphabetic letter was shifted three places down in the alphabet
D)Each alphabetic letter was shifted 5 places up in the alphabet.
Question
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
Question
The SHA-1 hashing algorithm creates a digest that is how many bits in length?

A)​96 bits
B)​128 bits
C)​160 bits
D)​192 bits
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.​
Question
Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:

A)AES
B)3DES
C)RSA
D)Twofish
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
Question
The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

A)matrix-based
B)lattice-based
C)linear
D)quantum
Question
A ________________ involves combining plaintext with a random key to create ciphertext that cannot be broken mathematically.​
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An algorithm that uses elliptic curves instead of prime numbers to compute keys
Question
The Data Encryption Standard is a(n) ______________ cipher.
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An asymmetric encryption key that does not have to be protected.​
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An asymmetric encryption key that does have to be protected.
Question
Describe the RIPEMD hash.
Question
Explain hashing.
Question
How can steganography be used to hide information in something other than images?
Question
Describe how Message Digest2 (MD2) works.
Question
Describe hard disk drive encryption.
Question
Discuss how cryptography can help ensure the availability of the data.
Question
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
Data that has been encrypted.​
Question
List and describe the characteristics a hashing algorithm must have to be considered secure.
Question
Discuss how HMAC works.
Question
Describe how a block cipher works.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/50
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Basic Cryptography
1
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?

A)Substitution
B)Block
C)Loop
D)Sponge
D
2
A Hardware Security Module (HSM) is essentially a chip on the motherboard of the computer that provides cryptographic services.
False
3
The asymmetric cryptography algorithm most commonly used is:

A)AES
B)RSA
C)Twofish
D)Blowfish
B
4
A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
5
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:

A)RSA
B)SHA1
C)MD5
D)MD2
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
6
A block cipher works on a single character at a time, and is faster than a stream cipher.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
7
What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?

A)GPG
B)OGP
C)CGP
D)GPP
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
8
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?

A)AES
B)Twofish
C)3DES
D)RSA
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
9
Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?

A)Reactive cryptography
B)Symmetric cryptography
C)Analog cryptography
D)Quantum cryptography
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
10
In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data?

A)Confidentiality
B)Availability
C)Encryption
D)Integrity
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is not one of the functions of a digital signature?

A)Verification of the sender
B)Prevention of the sender from disowning the message
C)Prove the integrity of the message
D)Protect the public key
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
12
Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
13
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?

A)RSA
B)AES
C)Blowfish
D)3DES
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
14
Self-encrypting HDD is commonly found in copiers and multifunction printers as well as point-of-sale systems used in government, financial, and medical environments.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
15
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?

A)shift
B)substitution
C)lock
D)loop
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
16
What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers?

A)FCC
B)RSA
C)ECC
D)IKE
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
17
Data that is in an unencrypted form is referred to as which of the following?

A)Plaintext
B)Plain text
C)Simpletext
D)Cleartext
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
18
What type of cryptography uses two keys instead of just one, generating both a private and a public key?

A)Symmetric
B)Asymmetric
C)Shared
D)Open
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
19
What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?

A)Twofish
B)Blowfish
C)Whirlpool
D)Rijndal
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
20
If using the MD5 hashing algorithm, what is the length to which each message is padded?

A)32 bits
B)64 bits
C)128 bits
D)512 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
21
In information technology, ____________________ is the process of proving that a user performed an action, such as sending an e-mail message or a specific document.
​Match the following terms to the appropriate definitions.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
22
The original cryptographic algorithms for encrypting and decrypting documents are ____________________ cryptographic algorithms.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
23
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An algorithm that takes one character and replaces it with one character.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
24
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A temporary key that is used only once before it is discarded.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
25
A key that is generated by a symmetric cryptographic algorithm is said to be a:

A)private key
B)public key
C)symmetric key
D)shared key
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
26
What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data?

A)hash
B)key
C)digest
D)block
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
27
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A cipher that manipulates an entire block of plaintext at one time.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
28
On what principle did Julius Caesar's cryptographic messages function?

A)Each alphabetic letter was replaced by a corresponding number
B)Each alphabetic letter was represented by a seemingly random symbol
C)Each alphabetic letter was shifted three places down in the alphabet
D)Each alphabetic letter was shifted 5 places up in the alphabet.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____________________ is a method used by operating systems to store, retrieve, and organize files.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
30
The SHA-1 hashing algorithm creates a digest that is how many bits in length?

A)​96 bits
B)​128 bits
C)​160 bits
D)​192 bits
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
31
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
32
Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES:

A)AES
B)3DES
C)RSA
D)Twofish
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
33
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
34
The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?

A)matrix-based
B)lattice-based
C)linear
D)quantum
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
35
A ________________ involves combining plaintext with a random key to create ciphertext that cannot be broken mathematically.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
36
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An algorithm that uses elliptic curves instead of prime numbers to compute keys
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
37
The Data Encryption Standard is a(n) ______________ cipher.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
38
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
39
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
An asymmetric encryption key that does not have to be protected.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
40
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
​An asymmetric encryption key that does have to be protected.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
41
Describe the RIPEMD hash.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
42
Explain hashing.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
43
How can steganography be used to hide information in something other than images?
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
44
Describe how Message Digest2 (MD2) works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
45
Describe hard disk drive encryption.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
46
Discuss how cryptography can help ensure the availability of the data.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
47
Match the following terms to the appropriate definitions
a. Advanced Encryption Standard (AES)
b. Block cipher
c. Ciphertext
d. Data Encryption Standard (DES)
e. Diffie-Hellman (DH)
f. Elliptic curve cryptography (ECC)
g. Ephemeral key
h. Private key
i. Public key
j. Stream cipher
Data that has been encrypted.​
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
48
List and describe the characteristics a hashing algorithm must have to be considered secure.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss how HMAC works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
50
Describe how a block cipher works.
Unlock Deck
Unlock for access to all 50 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 50 flashcards in this deck.