Chapter 2 - Cryptographic Tools (Computer Security: Principles and Practice, 2nd Edition)

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/44

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

45 Terms

1
New cards

T

Symmetric encryption is used primarily to provide confidentiality.

2
New cards

T

Two of the most important applications of public-key encryption are digital signatures and key management.

3
New cards

F

Cryptanalytic attacks try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

4
New cards

T

The secret key is input to the encryption algorithm.

5
New cards

F

Triple DES takes a plaintext block of 64 bits and a key of 56 bits to produce a ciphertext block of 64 bits.

6
New cards

T

Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data

7
New cards

F

The advantage of a stream cipher is that you can reuse keys.

8
New cards

T

A message authentication code is a small block of data generated by a secret key and appended to a message.

9
New cards

F

Like the MAC, a hash function also takes a secret key as input.

10
New cards

T

The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

11
New cards

T

Public-key cryptography is asymmetric.

12
New cards

F

Public-key algorithms are based on simple operations on bit patterns.

13
New cards

F

The purpose of the DSS algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

14
New cards

T

An important element in many computer security services and applications is the use of cryptographic algorithms.

15
New cards

T

Some form of protocol is needed for public-key distribution.

16
New cards

D

The original message or data that is fed into the algorithm is __________.

A. encryption algorithm B. secret key
C. decryption algorithm D. plaintext

17
New cards

A

The __________ is the encryption algorithm run in reverse.

A. decryption algorithm B. plaintext
C. ciphertext D. encryption algorithm

18
New cards

B

__________ is the scrambled message produced as output.

A. Plaintext B. Ciphertext
C. Secret key D. Cryptanalysis

19
New cards

B

On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack.

A. one-fourth B. half
C. two-thirds D. three-fourths

20
New cards

C

The most important symmetric algorithms, all of which are block ciphers, are the DES, triple DES, and the __________.

A. SHA B. RSA
C. AES D. DSS

21
New cards

A

If the only form of attack that could be made on an encryption algorithm is brute-force, then the way to counter such attacks would be to __________ .

A. use longer keys B. use shorter keys
C. use more keys D. use less keys

22
New cards

C

__________ is a procedure that allows communicating parties to verify that received or stored messages are authentic.

A. Cryptanalysis B. Decryption
C. Message authentication D. Collision resistance

23
New cards

D

The purpose of a __________ is to produce a "fingerprint" of a file, message, or other block of data.

A. secret key B. digital signature
C. keystream D. hash function

24
New cards

B

__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.

A. DSS B. RSA
C. SHA D. AES

25
New cards

A

A __________ is created by using a secure hash function to generate a hash value for a message and then encrypting the hash code with a private key.

A. digital signature B. keystream
C. one way hash function D. secret key

26
New cards

C

Transmitted data stored locally are referred to as __________ .

A. ciphertext B. DES
C. data at rest D. ECC

27
New cards

B

Digital signatures and key management are the two most important applications of __________ encryption.

A. private-key B. public-key
C. preimage resistant D. advanced

28
New cards

D

A __________ is to try every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained.

A. mode of operation B. hash function
C. cryptanalysis D. brute-force attack

29
New cards

A

Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator.

A. keystream B. digital signature
C. secure hash D. message authentication code

30
New cards

B

A _________ protects against an attack in which one party generates a message for another party to sign.

A. data authenticator B. strong hash function
C. weak hash function D. digital signature

31
New cards

symmetric encryption

Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is __________ .

32
New cards

brute-force

There are two general approaches to attacking a symmetric encryption scheme: cryptanalytic attacks and __________ attacks.

33
New cards

decryption

The __________ algorithm takes the ciphertext and the secret key and produces the original plaintext.

34
New cards

cryptanalytic

A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

35
New cards

block cipher

A __________ processes the plaintext input in fixed-size blocks and produces a block of ciphertext of equal size for each plaintext block.

36
New cards

stream cipher

A __________ processes the input elements continuously, producing output one element at a time.

37
New cards

Diffie and Hellman

Public-key encryption was first publicly proposed by __________ in 1976.

38
New cards

uniform distribution

The two criteria used to validate that a sequence of numbers is random are independence and _________ .

39
New cards

back-end appliance

A _________ is a hardware device that sits between servers and storage systems and encrypts all data going from the server to the storage system and decrypts data going in the opposite direction.

40
New cards

Electronic Frontier Foundation (EFF)

In July 1998 the __________ announced that it had broken a DES encryption using a special purpose "DES cracker" machine.

41
New cards

electronic codebook (ECB)

The simplest approach to multiple block encryption is known as __________ mode, in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.

42
New cards

pseudorandom

A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.

43
New cards

public and private key

The __________ is a pair of keys that have been selected so that if one is used for encryption, the other is used for decryption.

44
New cards

library-based tape encryption

__________ is provided by means of a co-processor board embedded in the tape drive and tape library hardware.

45
New cards

Diffie-Hellman Key Agreement

The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.