Chapter 2 Flashcards

1
Q

What are the essential ingredients of a symmetric cipher?

A

Plain Text
Encryption algorithm
secret key
cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many keys are required for two people to communicate via a symmetric cipher?

A

One

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two principal requirements for the secure use of symmetric encryption?

A

power encryption algorithm

Keep the secret key secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List three approaches to message authentication.

A

Authentication with symmetric encryption
Authentication without encryption
Message authentication code (MAC)
Hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is MAC?

A

Message authentication code – one type of message authentication which ensures the confidentiality of message and provides non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What properties must a hash function have to be useful for message authentication.

A

applied to a block of data
produces a fixed-length output
relatively easy to computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the principal ingredients of a public-key cryptosystem?

A
plain text 
Encryption algorithm
Public and private key
cipher text
decryption algorithm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List and define three uses of a public-key cryptosystem.

A

Encryption and decryption
Digital signature
Key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between a private key and a secret key?

A

Secret Key is used in symmetric encryption - same key is share between sender and receiver.
private key is used in asymmetric encryption - only the public key is shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Digital signature

A

method used to ensure message authentication and integrity of message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a public-key certificate?

A

a certificate or document which is used to validate the public key of a user. Consists of the ID of the user, the user’s public key and the digital signature of the CA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can public-key encryption be used to distribute a secret key?

A

Diffie-hellman exchange

RSA (Rivest, Shamir and Adleman) key exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly