Cryptography Quiz Study

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/12

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

13 Terms

1
New cards

In asymmetric cryptography, public keys can be broadly shared over non-secure channels and used by others to encrypt messages

True

2
New cards

Which of these is a public key encryption algorithm?

RSA

3
New cards

Which of the following are symmetric key ciphers? Select all that apply

AES & DES

4
New cards

Which of these are true about hash functions? (Select all that apply)

1.Hash functions allow any size input and produce a fixed number of bits for its hash

2. Hashes can be used to detect a change in a file

3. If hash values of two files are the same, we are 100% sure that they are the same file.

5
New cards

PKI in the context of cybersecurity stands for

public key infrastructure

6
New cards

Which of the following does a digital certificate NOT include? Choose 2

1.Private key of issuer

2.Private key of owner

7
New cards

To verify a signature on a message from Alice, Bob uses _____________.

Alice's public key

8
New cards

Assume Alice and Bob both have public and private keys in a pubic key setting. If Alice wants to send Bob a signed message, Alice first hashes her message and _______ the hash using ______'s ____________ key.

encrypts/Alice/private

9
New cards

Assume Alice and Bob both have public and private keys in a public key setting. If Alice and Bob want to agree on a secret value, then Alice uses her ________________ key and Bob's ____________ key to compute the secret value.

private / public

10
New cards

Assume Alice and Bob both have public and private keys in a public key setting. If Alice wants to send Bob a secret message, Alice encrypts her message using _________________ key and Bob decrypts it using ___________________key.

Bob's public

Bob's private

11
New cards

In cryptanalysis

__________________

is the study of the frequency of letters or groups of letters in a ciphertext.

frequency analysis

12
New cards

In which of these attack scenarios is the attacker most powerful?

Chosen plaintext attack

13
New cards

Which should take place first, authorization or authentication?

authentication

Explore top flashcards