Cryptography Quiz

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/19

flashcard set

Earn XP

Description and Tags

computer

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

20 Terms

1
New cards

The Rail Fence Cipher is a cipher that uses columns. The plaintext is written downwards and starts a new column when the bottom is reached. This technique used in the Rail Fence Cipher is an example of:

Transposition.

2
New cards

Evaluate the following modulo math problem.

20 + (35 mod 11)

22

3
New cards

Protecting data by hashing the data with a hashing function addresses which part(s) of the CIA triad?

Confidentiality and Integrity

4
New cards

A primary requirement for a good cryptographic hash function is that the function should not have collisions. A collision in a hash function is when:

two inputs map to the same output.

5
New cards

A hash function takes an input of any length and converts it into an output of a fixed length. What term is used for this output?

digest

6
New cards

Which of the following would be the most secure method when storing passwords in a database?

Passwords are both salted and hashed.

7
New cards

What is the name for the issuer of an SSL certificate?

a certificate authority

8
New cards

Which of the following mathematical expressions would produce the most secure encryption when used in the encryption algorithm?

value % 22

9
New cards

Which of the following salting procedures will produce the most secure encryption?

Use a randomized salt for every password.

10
New cards

Man-in-the-middle attacks affect which part(s) of the CIA triad?

Confidentiality and Integrity

11
New cards

A vulnerability of the Diffie-Hellman’s Key Exchange is a lack of _.

authentication

12
New cards

You are ready to publish a set of websites that includes the use of www.myWebsite.com and www.account.myWebsite.com. Which of the following SSL certificates will you want to purchase?

Wildcard SSL certificate

13
New cards

Which of the following is not a reason to revoke an SSL certificate?

The validity period has ended.

14
New cards

In the chain of trust, what is the name of the certificate that belongs to the issuer of the certificate?

The root certificate

15
New cards

Which is the largest disadvantage of symmetric encryption?

It is difficult to securely transmit the secret key.

16
New cards

A man-in-the-middle attack can endanger the security of the Diffie-Hellman method if the two parties are not _____.

authenticated

17
New cards

In a trapdoor function, the function is easy to:

encrypt

18
New cards

During asymmetric encryption, if Allie sends a message to Nicholas, she will use:

Nicholas’s public key

19
New cards

During asymmetric encryption, Nicholas will use ______ to open a message from Allie.

His private key

20
New cards

Which of the following ciphers uses asymmetric encryption?

RSA

Explore top flashcards