Filters
Question type

Study Flashcards

__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.


A) DSS
B) RSA
C) AES
D) SHA

E) A) and D)
F) None of the above

Correct Answer

verifed

verified

The original message or data that is fed into the algorithm is __________.


A) encryption algorithm
B) secret key
C) decryption algorithm
D) plaintext

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.

Correct Answer

verifed

verified

Combined one byte at a time with the plaintext stream using the XOR operation,a __________ is the output of the pseudorandom bit generator.


A) keystream
B) digital signature
C) secure hash
D) message authentication code

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

An important element in many computer security services and applications is the use of cryptographic algorithms.

A) True
B) False

Correct Answer

verifed

verified

True

A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.

Correct Answer

verifed

verified

The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

Correct Answer

verifed

verified

Diffie-Hel...

View Answer

On average,__________ of all possible keys must be tried in order to achieve success with a brute-force attack.


A) one-fourth
B) half
C) two-thirds
D) three-fourths

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

A) True
B) False

Correct Answer

verifed

verified

A _________ protects against an attack in which one party generates a message for another party to sign.


A) data authenticator
B) strong hash function
C) weak hash function
D) digital signature

E) B) and D)
F) None of the above

Correct Answer

verifed

verified

Also referred to as single-key encryption,the universal technique for providing confidentiality for transmitted or stored data is __________ .

Correct Answer

verifed

verified

symmetric ...

View Answer

Public-key encryption was first publicly proposed by __________ in 1976.

Correct Answer

verifed

verified

Diffie and Hellman

Public-key cryptography is asymmetric.

A) True
B) False

Correct Answer

verifed

verified

Symmetric encryption is used primarily to provide confidentiality.

A) True
B) False

Correct Answer

verifed

verified

The __________ is a pair of keys that have been selected so that if one is used for encryption,the other is used for decryption.

Correct Answer

verifed

verified

public and...

View Answer

The most important symmetric algorithms,all of which are block ciphers,are the DES,triple DES,and the __________.


A) SHA
B) RSA
C) AES
D) DSS

E) A) and D)
F) B) and C)

Correct Answer

verifed

verified

Some form of protocol is needed for public-key distribution.

A) True
B) False

Correct Answer

verifed

verified

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.


A) Cryptanalysis
B) Decryption
C) Message authentication
D) Collision resistance

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

C

A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.


A) mode of operation
B) hash function
C) cryptanalysis
D) brute-force attack

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Like the MAC,a hash function also takes a secret key as input.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer