Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Science
Computer Science
Computer Security and Reliability
Chapter 3 - Basic Cryptography
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Basic Cryptography
Terms in this set (82)
C. encrypts the key and the message
The Hashed Message Authentication Code (HMAC) _____.
A. encrypts only the message
B. encrypts only the key
C. encrypts the key and the message
D. encrypts the DHE key only
B. SHA-3
What is the latest version of the Secure Hash Algorithm?
A. SHA-2
B. SHA-3
C. SHA-4
D. SHA-5
C. ROT13
Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?
A. AES
B. XAND13
C. ROT13
D. Alphabetic
C. 0
Abram was asked to explain to one of his coworkers the XOR cipher. He showed his coworker an example of adding two bits, 1 and 1. What is the result of this sum?
A. 2
B. 1
C. 0
D. 16
C. Diffie-Hellman (DH)
Which of the following key exchanges uses the same keys each time?
A. Diffie-Hellman-RSA (DHRSA)
B. Diffie-Hellman Ephemeral (DHE)
C. Diffie-Hellman (DH)
D. Elliptic Curve Diffie-Hellman (ECDH)
B. perfect forward secrecy
Public key systems that generate random public keys that are different for each session are called _____.
A. Public Key Exchange (PKE)
B. perfect forward secrecy
C. Elliptic Curve Diffie-Hellman (ECDH)
D. Diffie-Hellman (DH)
B. plaintext
What is data called that is to be encrypted by inputting it into a cryptographic algorithm?
A. opentext
B. plaintext
C. cleartext
D. ciphertext
B. risk loss
Which of these is NOT a basic security protection for information that cryptography can provide?
A. authenticity
B. risk loss
C. integrity
D. confidentiality
D. in the directory structure of the file system
Which areas of a file cannot be used by steganography to hide data?
A. in areas that contain the content data itself
B. in the file header fields that describe the file
C. in data that is used to describe the content or structure of the actual data
D. in the directory structure of the file system
A. non-repudiation
Proving that a user sent an email message is known as _____.
A. non-repudiation
B. repudiation
C. integrity
D. availability
C. digest
A(n) _____ is not decrypted but is only used for comparison purposes.
A. key
B. stream
C. digest
D. algorithm
A. Collisions should be rare.
Which of these is NOT a characteristic of a secure hash algorithm?
A. Collisions should be rare.
B. A message cannot be produced from a predefined hash.
C. The results of a hash function should not be reversed.
D. The hash should always be the same fixed size.
B. confusion
Alyosha was explaining to a friend the importance of protecting a cryptographic key from cryptoanalysis. He said that the key should not relate in a simple way to the cipher text. Which protection is Alyosha describing?
A. diffusion
B. confusion
C. integrity
D. chaos
C. Advanced Encryption Standard
Which of these is the strongest symmetric cryptographic algorithm?
A. Data Encryption Standard
B. Triple Data Encryption Standard
C. Advanced Encryption Standard
D. RC 1
C. Alice's public key
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?
A. Alice's private key
B. Bob's public key
C. Alice's public key
D. Bob's private key
Recommended textbook explanations
Engineering Electromagnetics
8th Edition
John Buck, William Hayt
483 explanations
Introduction to Algorithms
3rd Edition
Charles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen
709 explanations
Computer Organization and Design MIPS Edition: The Hardware/Software Interface
5th Edition
David A. Patterson, John L. Hennessy
220 explanations
Operating System Concepts
9th Edition
Abraham Silberschatz, Greg Gagne, Peter B. Galvin
483 explanations
Other sets by this creator
Chapter 1: Modern Network Security Threats
6 terms
CCNA2 v7 Module 8 - SLAAC and DHCPv6
32 terms
CCNA2 v7 Module 7 - DHCPv4
18 terms
CCNA 2 v7 Modules 1-4: Switching Concept…
73 terms
Verified questions
COMPUTER SCIENCE
Suppose a stack is implemented using a singly linked list. Where in the list would it be best to have the push and pop operations take place? $$ \begin{matrix} \text{push} & \text{pop}\\ \text{a. head of list} & \text{head of list}\\ \text{b. head of list} & \text{tail of list}\\ \text{c. tail of list} & \text{head of list}\\ \text{d. tail of list} & \text{tail of list}\\ \text{e. All choices would be equally correct and efficient.}\\ \end{matrix} $$
COMPUTER SCIENCE
In Linux, shared libraries perform many operations central to the operating system. What is the advantage of keeping this functionality out of the kernel? Are there any drawbacks? Explain your answer.
COMPUTER SCIENCE
Show that when the main loop of SIMPLEX is run by INITIALIZE-SIMPLEX, it can never return “unbounded.
COMPUTER SCIENCE
A system provides support for user-level and kernel-level threads. The mapping in this system is one to one (there is a corresponding kernel thread for each user thread). Does a multithreaded process consist of (a) a working set for the entire process or (b) a working set for each thread? Explain.