Lecture 8 Flashcards
cryptography and Symmetric key algorithms (36 cards)
A poly-alphabetic substitution cipher used in WWII by the Germans used a machine named what?
Enigma
A mono-alphabetic substitution does what?
Rotates the letters of the alphabet X places
A mono-alphabetic substitution cipher is susceptible to what?
frequency analysis
The 4 fundamental goals of cryptography are:
Confidentiality
Integrity
Authentication
Non-repudiation
What type of cryptography is used to provide confidentiality?
A. symmetric
B. asymmetric
C. either/both
C. either/both
Cryptographic algorithms rely upon _____ (crypto-variables)
keys
In private key, participants use what?
A. unshared keys (all participants have their own)
B. shared keys (all participants share a key)
B. shared keys (all participants share a key)
In public key, participants use what?
A. unshared keys (all participants have their own)
B. shared keys (all participants share a key)
A. unshared keys (all participants have their own) (public/private keys)
The art and science of creating and implementing secret codes and ciphers
cryptography
The study of methods to defeat codes and ciphers
crypanalysis
What are true of Kerchoff’s principle? select all that apply
A. they should be known and public
B. they should be kept secret
C. keys should remain private
D. weaknesses are unknown
A. they should be known and public
C. keys should remain private
In the AND operations, 1 is returned when what?
When both X and Y are 1.
In the OR operations, 1 is returned when what?
When at least X or Y is 1.
In XOR operations, 1 is returned when what?
When only X or Y is 1, but not both.
The _______ function is the remainder of the division of one number by another.
EX: 10 Mod 3 is 1
A. Division
B. Multiplicity
C. Modular
D. Modulo
D. Modulo
_____ occurs when the relationship between the plain text and the key is so complicated an attacker can’t continue altering the plain text and analyze to determine the key.
A. confusion
B. diffusion
C. encryption
A. Confusion
_____ occurs when a change in the plain text results in many changes spread throughout the cipher text.
A. confusion
B. diffusion
C. encryption
B. Diffusion
A nonce is what?
random number generator
_____ is when the information/privilege required to perform an operation is divided among multiple users.
A. shared knowledge
B. split knowledge
C. separated knowledge
B. split knowledge
What is M of N control?
the minimum number of agents (M) out of the total number of agents (N) work together to perform high security task.
The cryptographic strength is determined by measuring what?
The effort to break it
A _____ is a cryptographic system of symbols that represent words or phrases.
A. Code
B. Cipher
A. Code
A _____ is always meant to hide the true meaning of a message.
A. Code
B. Cipher
B. Cipher
A ____ cipher rearranges the letters of a plain-text message.
transposition