1/19
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
The best way to thwart exhaustive searches by cryptanalysts is ________.
to make the key very long
In authentication, the party trying to provide its identity to the other party is called the applicant.
False, its the claimant
Packaged sets of cryptographic countermeasures for protecting data transmission are ________.
cryptographic systems
. These systems are designed to provide comprehensive protection for data transmission, including encryption, authentication, and integrity checks.
The hash size in SHA-1 is 160 bits.
True, its insecure now, but
SHA-224: 224-bit hash.
SHA-256: 256-bit hash.
SHA-384: 384-bit hash.
SHA-512: 512-bit hash. These are more secure than SHA-1 and are commonly used for digital signatures and data integrity.
Cryptanalysts have found weaknesses in ________.
MD5,
Cryptanalysts have identified significant vulnerabilities in MD5, particularly in its collision resistance
When both parties prove their identities to the other, this is called ________.
mutual authentication
Ensures that both parties involved in a communication or transaction verify their identities, enhancing trust and security.
What protection do cryptographic systems provide on a message-by-message basis?
message confidentiality
message authentication
message integrity
What is the hash size of SHA-256?
256 bits
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?
128 times as long
Which of the following statements accurately describes RC4?
RC4 can use a broad range of key lengths. RC4 is a stream cipher known for its simplicity and speed, making it efficient in many applications.
The hash size in MD-5 is 160 bits.
False, its 128 bits
In codes, code symbols may represent ________.
individual letters
complete words
complete phrases
When a hashing algorithm is applied, the hash will ALWAYS have a fixed length.
True
Nearly all encryption for confidentiality uses ________ encryption ciphers.
symmetric key
. Nearly all encryption for confidentiality relies on symmetric key encryption because it is faster and more efficient than public key encryption for encrypting large amounts of data. Symmetric key encryption uses the same key for both encryption and decryption, making it ideal for securing data in transit or at rest.
________ are proofs of identity.
Credentials
To meet national export limitation in many countries, RC4 often uses a key length of ________ bits.
RC4 often uses a 40-bit key length to comply with national export limitations in many countries. This shorter key length was historically mandated to restrict the strength of encryption for exported software, ensuring that it could be more easily decrypted if necessary.
Which of the following statements accurately describes RC4?
RC4 is extremely fast
The 56-bit key size ________.
is sufficient for most residential consumer applications
A 56-bit key size provides adequate security for everyday consumer use, such as protecting personal data and transactions. However, for more sensitive or high-value applications, longer key sizes are generally recommended to ensure stronger protection against exhaustive search attacks.
Someone who pretends to be someone else is ________.
an impostor
Someone who breaks encryption is called a ________.
cryptanalyst. A cryptanalyst is someone who studies and attempts to break encryption systems, often analyzing cryptographic algorithms to uncover vulnerabilities or decipher encrypted messages.