mod 3 itn266

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

The best way to thwart exhaustive searches by cryptanalysts is ________.


 

to make the key very long


2
New cards

In authentication, the party trying to provide its identity to the other party is called the applicant.


False, its the claimant

3
New cards

Packaged sets of cryptographic countermeasures for protecting data transmission are ________.


 

cryptographic systems


. These systems are designed to provide comprehensive protection for data transmission, including encryption, authentication, and integrity checks.

4
New cards

The hash size in SHA-1 is 160 bits.


True, its insecure now, but

  • SHA-224: 224-bit hash.

  • SHA-256: 256-bit hash.

  • SHA-384: 384-bit hash.

  • SHA-512: 512-bit hash. These are more secure than SHA-1 and are commonly used for digital signatures and data integrity.

5
New cards

Cryptanalysts have found weaknesses in ________.


MD5,

Cryptanalysts have identified significant vulnerabilities in MD5, particularly in its collision resistance

6
New cards

When both parties prove their identities to the other, this is called ________.


 

mutual authentication


Ensures that both parties involved in a communication or transaction verify their identities, enhancing trust and security.

7
New cards

What protection do cryptographic systems provide on a message-by-message basis?


message confidentiality

 

message authentication

 

message integrity

8
New cards

What is the hash size of SHA-256?


 

256 bits


9
New cards

If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?


 

128 times as long


10
New cards

Which of the following statements accurately describes RC4?


RC4 can use a broad range of key lengths. RC4 is a stream cipher known for its simplicity and speed, making it efficient in many applications.

11
New cards

The hash size in MD-5 is 160 bits.


False, its 128 bits

12
New cards

In codes, code symbols may represent ________.


individual letters

complete words

complete phrases

13
New cards

When a hashing algorithm is applied, the hash will ALWAYS have a fixed length.


 

True


14
New cards

Nearly all encryption for confidentiality uses ________ encryption ciphers.

 

symmetric key

. Nearly all encryption for confidentiality relies on symmetric key encryption because it is faster and more efficient than public key encryption for encrypting large amounts of data. Symmetric key encryption uses the same key for both encryption and decryption, making it ideal for securing data in transit or at rest.

15
New cards

________ are proofs of identity.

Credentials

16
New cards

To meet national export limitation in many countries, RC4 often uses a key length of ________ bits.

RC4 often uses a 40-bit key length to comply with national export limitations in many countries. This shorter key length was historically mandated to restrict the strength of encryption for exported software, ensuring that it could be more easily decrypted if necessary.

17
New cards

Which of the following statements accurately describes RC4?

RC4 is extremely fast

18
New cards

The 56-bit key size ________.

is sufficient for most residential consumer applications

A 56-bit key size provides adequate security for everyday consumer use, such as protecting personal data and transactions. However, for more sensitive or high-value applications, longer key sizes are generally recommended to ensure stronger protection against exhaustive search attacks.

19
New cards

Someone who pretends to be someone else is ________.

 

an impostor


20
New cards

Someone who breaks encryption is called a ________.


cryptanalyst. A cryptanalyst is someone who studies and attempts to break encryption systems, often analyzing cryptographic algorithms to uncover vulnerabilities or decipher encrypted messages.