1/12
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
In asymmetric cryptography, public keys can be broadly shared over non-secure channels and used by others to encrypt messages
True
Which of these is a public key encryption algorithm?
RSA
Which of the following are symmetric key ciphers? Select all that apply
AES & DES
Which of these are true about hash functions? (Select all that apply)
1.Hash functions allow any size input and produce a fixed number of bits for its hash
2. Hashes can be used to detect a change in a file
3. If hash values of two files are the same, we are 100% sure that they are the same file.
PKI in the context of cybersecurity stands for
public key infrastructure
Which of the following does a digital certificate NOT include? Choose 2
1.Private key of issuer
2.Private key of owner
To verify a signature on a message from Alice, Bob uses _____________.
Alice's public key
Assume Alice and Bob both have public and private keys in a pubic key setting. If Alice wants to send Bob a signed message, Alice first hashes her message and _______ the hash using ______'s ____________ key.
encrypts/Alice/private
Assume Alice and Bob both have public and private keys in a public key setting. If Alice and Bob want to agree on a secret value, then Alice uses her ________________ key and Bob's ____________ key to compute the secret value.
private / public
Assume Alice and Bob both have public and private keys in a public key setting. If Alice wants to send Bob a secret message, Alice encrypts her message using _________________ key and Bob decrypts it using ___________________key.
Bob's public
Bob's private
In cryptanalysis
__________________
is the study of the frequency of letters or groups of letters in a ciphertext.
frequency analysis
In which of these attack scenarios is the attacker most powerful?
Chosen plaintext attack
Which should take place first, authorization or authentication?
authentication