Principles of Information Security, 4th Ed., Chapter 8

20 terms by idrive140mph 

Create a new folder

Advertisement Upgrade to remove ads

Whitman and Mattord

The entire range of values that can possibly be used to construct an individual key.

Keyspace

Developed by Phil Zimmermann and uses the IDEA Cipher for message encoding.

PGP

The amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown.

Work factor

An x.509 v3 certificate binds a ____, which uniquely identifies a certificate entity, to a user's public key.

distinguished name

Bit stream methods commonly use algorithm functions like the exclusive OR operation ___.

XOR

The process of converting an original message into a form that is unreadable to unauthorized individuals.

Encryption

The protocol used to secure communications across any IP-based network such as LANs, WANs, and the Internet.

IPSec

A federal information processing standard that specifies a cryptograhic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure.

AES

A hybrid cryptosystem that combines some of the best available cryptographic algorithms and has become the open-source de facto standard for encryption and authentication of e-mail and file storage applications.

PGP

More advanced substitution ciphers use two or more alphabets, and are referred to as ____ substitutions.

polyalphabetic

The information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.

Key

A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.

symmetric

The ____algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.

RSA

The ____is responsible for the fragmentation, compression, encryption, and attachment of an SSL header to the cleartext prior to transmission.

SSL Record Protocol

An integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.

PKI

Encrypted messages that can be mathematically proven to be authentic.

Digital signatures

____functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.

Hash

A____is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.

MAC

____attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.

Correlation

The ____protocol provides system-to-system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.

AH (authentication header)

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set