security chapter 5 – Flashcards
Unlock all answers in this set
Unlock answersquestion
The SHA-1 hashing algorithm creates a digest that is how many bits in length?
answer
160 bits
question
The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques?
answer
lattice-based
question
Which of the following is not one of the functions of a digital signature?
1. Verification of the sender
2. Prevention of the sender from disowning the message
3.Prove the integrity of the message
4.Protect the public key
answer
Protect the public key
question
After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor?
answer
3DES
question
Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography?
answer
Quantum cryptography
question
What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can't be used to reveal the original set of data?
answer
hash
question
On what principle did Julius Caesar's cyptographic messages function?
answer
Each alphabetic letter was shifted three places down in the alphabet
question
The asymmetric cryptography algorithm most commonly used is:
answer
RSA
question
What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as?
answer
Blowfish
question
A key that is generated by a symmetric cryptographic algorithm is said to be a:
answer
private key
question
The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what?
answer
substitution
question
Self-encrypting HDD is commonly found in copiers and multi function printers as well as point-of-sale systems used in government, financial, and medical environments.
answer
True
question
Data that is in an unencrypted form is referred to as which of the following?
answer
Cleartext
question
What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP?
answer
GPG
question
A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted.
answer
false
question
What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents?
answer
Whirlpool
question
Steganography hides the existence of data within images by dividing and hiding portions of a file within the image.
answer
True
question
Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length:
answer
MD2
question
Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length?
answer
Sponge
question
If using the MD5 hashing algorithm, what is the length to which each message is padded?
answer
512
question
A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES
answer
AES - advanced encryption standard
question
An algorithm that uses elliptic curves instead of prime numbers to compute keys
answer
ECC - elliptic curve cryptography
question
An asymmetric encryption key that does not have to be protected..
answer
public key
question
A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks
answer
DES - data encryption standard
question
A temporary key that is used only once before it is discarded..
answer
ephemeral key
question
An asymmetric encryption key that does have to be protected.
answer
private key
question
A cipher that manipulates an entire block of plaintext at one time..
answer
block cipher
question
A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created..
answer
DH - diffie-Hellman Ephemeral
question
An algorithm that takes one character and replaces it with one character.
answer
steam cipher
question
Data that has been encrypted.
answer
ciphertext