Filters
Question type

Study Flashcards

If the only form of attack that could be made on an encryption algorithm is brute-force,then the way to counter such attacks would be to __________ .


A) use longer keys
B) use shorter keys
C) use more keys
D) use less keys

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A _________ protects against an attack in which one party generates a message for another party to sign.


A) data authenticator
B) strong hash function
C) weak hash function
D) digital signature

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

Correct Answer

verifed

verified

Diffie-Hel...

View Answer

There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and __________ attacks.

Correct Answer

verifed

verified

Some form of protocol is needed for public-key distribution.

A) True
B) False

Correct Answer

verifed

verified

Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits.

A) True
B) False

Correct Answer

verifed

verified

The original message or data that is fed into the algorithm is __________.


A) encryption algorithm
B) secret key
C) decryption algorithm
D) plaintext

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

Public-key algorithms are based on simple operations on bit patterns.

A) True
B) False

Correct Answer

verifed

verified

A message authentication code is a small block of data generated by a secret key and appended to a message.

A) True
B) False

Correct Answer

verifed

verified

A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.

Correct Answer

verifed

verified

Symmetric encryption is used primarily to provide confidentiality.

A) True
B) False

Correct Answer

verifed

verified

Like the MAC,a hash function also takes a secret key as input.

A) True
B) False

Correct Answer

verifed

verified

Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data.

A) True
B) False

Correct Answer

verifed

verified

T F 4.The secret key is input to the encryption algorithm.

A) True
B) False

Correct Answer

verifed

verified

The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext.

Correct Answer

verifed

verified

Two of the most important applications of public-key encryption are digital signatures and key management.

A) True
B) False

Correct Answer

verifed

verified

Also referred to as single-key encryption,the universal technique for providing confidentiality for transmitted or stored data is __________ .

Correct Answer

verifed

verified

symmetric ...

View Answer

The two criteria used to validate that a sequence of numbers is random are independence and _________ .

Correct Answer

verifed

verified

uniform di...

View Answer

The most important symmetric algorithms,all of which are block ciphers,are the DES,triple DES,and the __________.


A) SHA
B) RSA
C) AES
D) DSS

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

The purpose of a __________ is to produce a "fingerprint" of a file,message,or other block of data.


A) secret key
B) digital signature
C) keystream
D) hash function

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer