Chapter 13 Crptography

0.0(0)
Studied by 10 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

Last updated 4:02 AM on 10/2/23
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

1. With a rotation of 4, what does erwaiv decrypt to?

A. waive

B. wave

C. answer

D. decrypt

. C. This is a rotation cipher with a key of 4. When you rotate the alphabet by 4, you end up with e = a, r = n, w = s, and so on. In addition to not being the right decryption, none of the others has the correct number of letters. In a substitution cipher like a rotation cipher, you will always have the same number of letters in the output as you do in the input.

2
New cards

2. What do you call a message before it is encrypted?

A. Text

B. Plain text

C. Bare words

D. Bare text

B. In cryptography, any data or message that is in an unencrypted state is called plaintext. The output from a cryptographic process is ciphertext. While you may have text as input to an encryption process, the word text would be ambiguous in this context. The other two are unrelated to cryptography.

3
New cards

3. What does PGP use to verify identity?

A. Central authority

B. Web of users

C. Web of trust

D. Central trust authority

C. Where certificate authorities use a centralized mechanism for verification of users or certificate subjects, PGP uses a decentralized model. PGP calls this a web of trust, where individual users sign keys that belong to other people to validate that they are who they say they are. All of the other answers are made‐up terms.

4
New cards

4. What principle is used to demonstrate that a signed message came from the owner of the key that signed it? A. Nonrepudiation

B. Nonverifiability

C. Integrity

D. Authority

A. Integrity is part of the CIA triad but isn't the principle that ties a signed message back to the subject of the signing certificate. Nonverifiability is nonsense, and authority isn't relevant here. Instead, nonrepudiation means someone can't say they didn't send a message if it was signed with their key. This assumes the key was in their possession and password protected, meaning no one else could use it.

5
New cards

5. What is Diffie‐Hellman used for?

A. Key management

B. Key isolation

C. Key exchange

D. Key revocation

. C. Certificates can be revoked, but that's not what Diffie–Hellman is used for. Key management is a much broader topic than key exchange, which is what Diffie–Hellman is used for. It is a process that allows two parties to an encrypted conversation to mutually derive the same key starting with the same base value.

6
New cards

6. How did 3DES improve on DES?

A. Made the key longer

B. Used two keys

C. Changed algorithms

D. Used three keys

D. 3DES, or Triple DES, uses three keys. The first key is used to encrypt the plaintext. The second key is used to decrypt the ciphertext resulting from the first round of encryption. Finally, the third key is used to encrypt the ciphertext that resulted from the decryption with the second key. The key wasn't made longer because the 168 bits used in 3DES aren't used in a single key. The underlying DES algorithm is still used.

7
New cards

7. What improvement does elliptic curve cryptography make?

A. Smaller keys improve speed

B. Algorithm is more complex

C. Doesn't use factoring, which is better

D. Longer keys

A. Algorithms used for elliptic curve cryptography are not more complex necessarily. While they don't use factoring, that fact alone doesn't necessarily make the algorithms better. Instead, elliptic curve cryptography relies on the assumption that a discrete logarithm of a point on an elliptic curve can't be computed in a consistent way. The keys that result from elliptic key cryptography are actually smaller than those that result from factoring with large prime numbers.

8
New cards

8. What is it called when two different data sets yield the same cryptographic hash?

A. Paradox

B. Collision

C. Crash

D. Unrealistic

B. When two different data sets yield the same cryptographic hash, it is called a collision. It relates to a mathematical problem called the birthday paradox, but two values being the same is not a paradox. It's also not unrealistic, nor is it a crash.

9
New cards

9. Which of the following terms can be used in a description of asymmetric key encryption?

A. Defined key

B. Multifactor

C. Public key

D. Single factor

. C. Asymmetric key cryptography uses two related keys. One key is used for encryption, and one is used for decryption. These keys are referred to as the public and private keys. Because it's the public key that is used to encrypt messages to the owner of the paired private key, this type of encryption is commonly referred to as public key cryptography. It is neither single‐factor nor multifactor since it's not authentication.

10
New cards

10. If Alice were to send an email to Bob, what key would she use to encrypt the message?

A. PGP key

B. Private key

C. Public key

D. Symmetric key

C. Public key cryptography works because the public key can be provided to anyone. The only thing you can do with the public key is encrypt a message that could be decrypted by the matched private key. This process uses asymmetric encryption, so it's not a symmetric key. The private key has to be with the owner of the key and protected. If that key gets out, any messages encrypted to the owner by the public key could be decrypted. PGP uses public/private keys and does not have its own type of key.

11
New cards

11. What property allows you to trust someone trusted by a certificate authority you trust?

A. Commutative property

B. Associative property

C. Communicative property

D. Transitive property

D. What this says is that if A trusts B and B trusts C, then A can trust C. This is an application of the transitive property. The commutative and associative properties are both also mathematical principles. There is no such thing as a communicative property.

12
New cards

12. Why is symmetric key encryption typically used over asymmetric key encryption?

A. It's faster.

B. It's more secure.

C. It's easier to implement.

D. It isn't encumbered with patents.

A. Symmetric key encryption is generally used instead of asymmetric key encryption because symmetric key encryption uses shorter keys and fewer resources, resulting in shorter times for encryption and decryption. This does not make it more secure, even if that word were to be defined in this context. Symmetric key is not easier to implement, and asymmetric key is not encumbered with patents, which is why C and D are wrong.

13
New cards

13. What is it called when both symmetric and asymmetric keys are used?

A. Fast cryptosystem

B. Hybrid cryptosystem

C. Super‐symmetric cryptosystem

D. Dual key cryptosystem

. B. When both symmetric and asymmetric keys are used, typically where the asymmetric key is used to protect the symmetric key, it is called a hybrid cryptosystem. The other options don't exist.

14
New cards

14. What is MD5 or SHA‐1 commonly used for in cryptography?

A. Media access control (MAC)

B. Machine authentication code (MAC)

C. Message access code (MAC)

D. Message authentication code (MAC)

D. Media access control (MAC) is an address attached to physical network interfaces. The correct answer is message authentication code because SHA‐1 and MD5 are used as message authentication codes to ensure that a message has not been tampered with. This means it is being authenticated.

15
New cards

15. What type of encryption does PGP use?

A. Null key

B. Asymmetric key

C. Trusted key

D. Web key

B. PGP uses public and private keys. The public key is stored in a public place like a key repository. Since there are two keys, PGP uses asymmetric key encryption, sometimes known as public key encryption.

16
New cards

16. What tool would you use to identify ciphersuites in use on a web server?

A. Hydra

B. sslscan

C. tlsscan

D. cipherscan

B. Hydra is used to brute‐force passwords against network services. The tools tlsscan and cipherscan don't exist. While the SSL protocol has been deprecated for many years, it is still commonly used, so the tool is sslscan.

17
New cards

17. How does AES protect against related‐key attacks?

A. Longer key lengths

B. Better initialization vectors

C. Implementation doesn't allow related keys

D. Upgrading to AES‐2

C. Protecting against related keys is done in the implementation rather than the specification. The implementation of AES should not allow related keys to be issued. None of the other answers are true.

18
New cards

18. What is one advantage of using a certificate authority?

A. Trusted third party doing validation

B. A certificate authority is faster

C. Stronger keys are offered

D. They support more cipher suites

A. A certificate authority is a trusted third party that can validate users and their identity, relieving everyone from having to verify every user's identity themselves. A certificate authority is not faster, and they don't offer stronger keys. The certificate authority is not responsible for ciphersuites being supported, just the certificate.

19
New cards

19. How does a certificate authority keep a list of valid certificates up‐to‐ date?

A. Periodic CA update

B. Hashing the list

C. Re‐validating identities

D. Certificate revocation lists

D. A certificate revocation list is used to indicate when a certificate is no longer valid. Hashing the list won't help and re‐validating identities may only be necessary when a certificate has fully expired. When a certificate expires it may be put on the certificate revocation list. A periodic CA update is ambiguous, but may be updating software, which won't keep a certificate list up‐to‐date.

20
New cards

20. What security property suggests that an email signed by an individual's key must have come from that person? A. Confidentiality

B. Integrity

C. Availability

D. Nonrepudiation

D. The property of nonrepudiation says that a key belonging to an individual, where the private key is protected by a password and not accessible to everyone, will not be used by anyone but that individual, so any message signed by their key must have come from them. While encrypted messages are related to confidentiality, signing a message is not encrypting it. The other properties are not related to this scenario.

Explore top notes

note
Observation and Critique Exercise
Updated 626d ago
0.0(0)
note
Of Mice and Men - Study Guide
Updated 1275d ago
0.0(0)
note
Mental Health
Updated 323d ago
0.0(0)
note
Chapter 22: Solutions
Updated 1032d ago
0.0(0)
note
WW2 1939-1945
Updated 1386d ago
0.0(0)
note
Chapter 8 - Acids, Bases, and pH
Updated 1437d ago
0.0(0)
note
Observation and Critique Exercise
Updated 626d ago
0.0(0)
note
Of Mice and Men - Study Guide
Updated 1275d ago
0.0(0)
note
Mental Health
Updated 323d ago
0.0(0)
note
Chapter 22: Solutions
Updated 1032d ago
0.0(0)
note
WW2 1939-1945
Updated 1386d ago
0.0(0)
note
Chapter 8 - Acids, Bases, and pH
Updated 1437d ago
0.0(0)

Explore top flashcards

flashcards
Gilded Age Study Guide
74
Updated 729d ago
0.0(0)
flashcards
Semester Exam Revision
182
Updated 478d ago
0.0(0)
flashcards
VOCAB FINAL HAMILTON
83
Updated 1192d ago
0.0(0)
flashcards
Verbs (me-)
41
Updated 1026d ago
0.0(0)
flashcards
Unit 3: Iceland
24
Updated 892d ago
0.0(0)
flashcards
Sociology 2463 Midterm 2
216
Updated 101d ago
0.0(0)
flashcards
Gilded Age Study Guide
74
Updated 729d ago
0.0(0)
flashcards
Semester Exam Revision
182
Updated 478d ago
0.0(0)
flashcards
VOCAB FINAL HAMILTON
83
Updated 1192d ago
0.0(0)
flashcards
Verbs (me-)
41
Updated 1026d ago
0.0(0)
flashcards
Unit 3: Iceland
24
Updated 892d ago
0.0(0)
flashcards
Sociology 2463 Midterm 2
216
Updated 101d ago
0.0(0)