MOD 12 QUIZ - PKI and Cryptographic Applications Flashcards

(29 cards)

1
Q

In public key cryptosystems, each user has how many keys?

A

Two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A digital signature is a(n) _________________.

A

encrypted message digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To verify a signature, what must be done?

A

decrypt using public key and generate a digest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does FIPS stand for?

A

Federal Information Processing Standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does PKI stand for?

A

Public Key Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What conditions must a hash function satisfy?

A

Easy to compute
Collision resistant
One-way

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the steps involved in Certificates?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Certificate Authorities?

A

Neutral organizations that offer notarization services for digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is MD2 a secure hashing algorithm?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does TOR allow?

A

Anonymous hosting
Anonymous browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Quantum Supremacy?

A

The ability for quantum computers to solve hard problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RSA depends on what for security?

A

Computational difficulty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

HMAC guarantees what?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How large is the message digest for a SHA-256 hash?

A

256 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When digitally signing a document a ________ is _____________ using a __________

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Analytic Attack?

17
Q

What is Implementation Attack?

18
Q

What is a Brute Force Attack?

18
Q

What is a Side-Channel Attack?

19
Q

What is a Timing Attack?

20
Q

What block size is used by SHA-512?

21
Q

What does SHA stand for?

A

Secure Hash Algorithm

22
Q

An RSA key of 3072 is equivalent to which other keys?

23
Q

A Hash function takes in __________ bits and outputs __________ bits

A

variable
fixed length

24
What are the goals for digital signature systems
That a message came from the claimed sender That the message was not altered
25
What provides assurance that the people they are communicating with truly are who they claim to be?
Certificates
26
Asymmetric key cryptography uses what kinds of key(s)?
Public and Private keys
27
What is the hash-value length of a RIPEMD-256 hash?
256 bits
28
What is Steganography?
Hiding messages in other messages