chapter2 Flashcards
(30 cards)
Symmetric encryption is used primarily to provide confidentiality
T
Two of the most important applications of public-key encryption are
digital signatures and key management.
T
Cryptanalytic attacks try every possible key on a piece of ciphertext
until an intelligible translation into plaintext is obtained.
F
The secret key is input to the encryption algorithm
T
Triple DES takes a plaintext block of 64 bits and a key of 56 bits to
produce a ciphertext block of 64 bits.
F
Modes of operation are the alternative techniques that have been
developed to increase the security of symmetric block encryption for large sequences of data.
T
The advantage of a stream cipher is that you can reuse keys.
F
A message authentication code is a small block of data generated by a
secret key and appended to a message.
T
Like the MAC, a hash function also takes a secret key as input.
F
The strength of a hash function against brute-force attacks depends
solely on the length of the hash code produced by the algorithm.
T
Public-key cryptography is asymmetric
T
Public-key algorithms are based on simple operations on bit patterns
F
The purpose of the DSS algorithm is to enable two users to securely
reach agreement about a shared secret that can be used as a secret key
for subsequent symmetric encryption of messages
F
An important element in many computer security services and
applications is the use of cryptographic algorithms.
T
Some form of protocol is needed for public-key distribution
T
The original message or data that is fed into the algorithm is __________.
A. encryption algorithm B. secret key
C. decryption algorithm D. plaintext
plaintext
The __________ is the encryption algorithm run in reverse.
A. decryption algorithm B. plaintext
C. ciphertext D. encryption algorithm
decryption algorithm
__________ is the scrambled message produced as output.
A. Plaintext B. Ciphertext
C. Secret key D. Cryptanalysis
Ciphertext
On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack.
A. one-fourth B. half
C. two-thirds D. three-fourths
half
The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.
A. SHA B. RSA
C. AES D. DSS
AES
If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ .
A. use longer keys B. use shorter keys
C. use more keys D. use less keys
use longer keys
__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.
A. Cryptanalysis B. Decryption
C. Message authentication D. Collision resistance
Message authentication
The purpose of a __________ is to produce a “fingerprint” of a file, message, or other block of data.
A. secret key B. digital signature
C. keystream D. hash function
hash function
__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.
A. DSS B. RSA
C. SHA D. AES
RSA