Lecture 8 Flashcards Preview

AIT 660 - Cyber Security > Lecture 8 > Flashcards

Flashcards in Lecture 8 Deck (36)
Loading flashcards...
1
Q

A poly-alphabetic substitution cipher used in WWII by the Germans used a machine named what?

A

Enigma

2
Q

A mono-alphabetic substitution does what?

A

Rotates the letters of the alphabet X places

3
Q

A mono-alphabetic substitution cipher is susceptible to what?

A

frequency analysis

4
Q

The 4 fundamental goals of cryptography are:

A

Confidentiality
Integrity
Authentication
Non-repudiation

5
Q

What type of cryptography is used to provide confidentiality?

A. symmetric
B. asymmetric
C. either/both

A

C. either/both

6
Q

Cryptographic algorithms rely upon _____ (crypto-variables)

A

keys

7
Q

In private key, participants use what?

A. unshared keys (all participants have their own)
B. shared keys (all participants share a key)

A

B. shared keys (all participants share a key)

8
Q

In public key, participants use what?

A. unshared keys (all participants have their own)
B. shared keys (all participants share a key)

A

A. unshared keys (all participants have their own) (public/private keys)

9
Q

The art and science of creating and implementing secret codes and ciphers

A

cryptography

10
Q

The study of methods to defeat codes and ciphers

A

crypanalysis

11
Q

What are true of Kerchoff’s principle? select all that apply

A. they should be known and public
B. they should be kept secret
C. keys should remain private
D. weaknesses are unknown

A

A. they should be known and public

C. keys should remain private

12
Q

In the AND operations, 1 is returned when what?

A

When both X and Y are 1.

13
Q

In the OR operations, 1 is returned when what?

A

When at least X or Y is 1.

14
Q

In XOR operations, 1 is returned when what?

A

When only X or Y is 1, but not both.

15
Q

The _______ function is the remainder of the division of one number by another.
EX: 10 Mod 3 is 1

A. Division
B. Multiplicity
C. Modular
D. Modulo

A

D. Modulo

16
Q

_____ occurs when the relationship between the plain text and the key is so complicated an attacker can’t continue altering the plain text and analyze to determine the key.

A. confusion
B. diffusion
C. encryption

A

A. Confusion

17
Q

_____ occurs when a change in the plain text results in many changes spread throughout the cipher text.

A. confusion
B. diffusion
C. encryption

A

B. Diffusion

18
Q

A nonce is what?

A

random number generator

19
Q

_____ is when the information/privilege required to perform an operation is divided among multiple users.

A. shared knowledge
B. split knowledge
C. separated knowledge

A

B. split knowledge

20
Q

What is M of N control?

A

the minimum number of agents (M) out of the total number of agents (N) work together to perform high security task.

21
Q

The cryptographic strength is determined by measuring what?

A

The effort to break it

22
Q

A _____ is a cryptographic system of symbols that represent words or phrases.

A. Code
B. Cipher

A

A. Code

23
Q

A _____ is always meant to hide the true meaning of a message.

A. Code
B. Cipher

A

B. Cipher

24
Q

A ____ cipher rearranges the letters of a plain-text message.

A

transposition

25
Q

A ____ cipher uses an encryption algorithm to replace each character or bit of the plain-text message with a different one.

A

substitution

26
Q

A _____ uses different substitution alphabet for each letter. It is a very long series of numbers.

A

one-time pad

27
Q

A _____ cipher is as long as the message itself and it usually chosen from a common book.

A

running key (book)

28
Q

A longer key usually provides what?

A. stronger encryption
B. weaker encryption

A

A. stronger encryption

29
Q

Modern cryptographic system have a key size of at least what?

A

128 bit

30
Q

Bulk encryption is primarily used with what type of cryptography?

A

Symmetric key (secret/private key cryptography)

31
Q

What are true of symmetric key cryptography.

A. uses a small key
B. needs a secure method of exchanging the key
C. does not provide nonrepudiation
D. scalable
E. uses a large key
F. fast
A

B. needs a secure method of exchanging the key
C. does not provide nonrepudiation
E. uses a large key
F. fast

32
Q

What are true of asymmetric key cryptography.

A. it uses a private and public key
B. provides nonrepudiation
C. scalable
D. fast
E. difficult key revocation
F. key distribution is simple
A

A. it uses a private and public key
B. provides nonrepudiation
C. scalable
F. key distribution is simple

33
Q

A _____ transforms a variable-size input and returns a fixed-size string.

A

hashing algorithm

34
Q

_____ is a 64-bit block cipher that has 5 modes of operation. The key is 56 bits long and uses XOR operations run through 16 times.

A. SHA
B. AES
C. PSK
D. DES

A

D. DES

35
Q

_____ replaced DES and uses lengths and block sizes of 128, 192 and 256 bits.

A. SHA
B. AES
C. PSK
D. DES

A

B. AES

36
Q

What are the 3 methods used to exchange secret keys securely.

A

Offline distribution
public key encryption
diffie-hellman key exchange algorithm