Chapter 07: Cryptography and the Public Key Infrastructure Flashcards
Which of the following is a Cryptography goal (select all that apply)?
a. Confidentiality
b. Integrity
c. Availability
d. Denial
a. Confidentiality
b. Integrity
Which of the following is not a cryptography goal?
a. Confidentiality
b. Availability
c. Nonpedudiation
d. Authentication
b. Availability
A ______ is a method used to scramble or obfuscate characters to hide their value.
Cipher
Name two primary types of nonmathematical cryptography.
Transposition and Substitution.
A ________ is a type of coding or ciphering system that changes one character or symbol into another.
Substitution cipher
A _______ has multiple substitution alphabets for the same message.
Polyalphabetic substitution ciphers
Which category does Vigenere cipher fit?
Polyalphabetic Substitution
Which category does Caesar cipher fit?
Substitution Cipher
Which category does Columnar cipher fit?
Transposition Cipher
A _____ involves scrambling the letters in a certain manner. Typically, a message is broken into blocks of equal size and then scrambled.
Transposition cipher
The ________ was created by the German government during WW2 to provide secure communications between military and political units.
Enigma Machine
_______ is the art of using cryptographic techniques to embed secret messages within another file.
Steganography
______ use a shared secret key available to all users of the cryptosystem.
Symmetric Cryptosystems
_____ uses individual combinations of public/private keys for each user of the system.
Asymmetric Cryptosystems
How does obfuscation differ from confidentiality?
Obfuscation is the practice of making it intentionally difficult for humans to understand how code works.
The recipient of the message simply verifies that the message’s ___________ is valid, ensuring that the message was not altered in transit.
digital signature
_______ verifies the claimed identity of system users.
Authentication
________ provides assurance to the recipient that the message was originated by the sender and not someone masquerading as the sender.
Nonrepudiation
Before a message is put into coded form, it is in _________.
Plain Text, represented by P in encryption algorithms.
The sender of a message uses cryptographic algorithm to encrypt the plain-text message and produce a __________.
cypher text message
The _______ is that a cryptographic system should be secure even if everything about the system, except the key, is public knowledge.
Kerchoff
What is another name for cryptographic keys.
Cryptovariables
_______ is the study of methods to defeat codes and ciphers.
Cryptanalysis
Specific implementations of code or cipher in hardware and software are known as ___________.
Cryptosystems