hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
notes
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (21)
A __________ is an attack in which the adversary chooses a number of ciphertexts and is then given the corresponding plaintexts, decrypted with the target's private key.
chosen ciphertext attack
The __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.
public key certificate
A __________ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.
one-way function
The sender 'signs' a message with its private key. Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message," is a description of a
digital signature
__________ depend on the running time of the decryption algorithm.
timing attacks
Two issues to consider with the computation required to use RSA are encryption/decryption and __________ .
key generation
The difficulty of attacking __________ is based on the difficulty of finding the prime factors of a composite number.
RSA
The __________ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
public key infrastructure
In the Advanced Encryption Standard the decryption algorithm is identical to the encryption algorithm.
True
AES processes the entire data block as a single matrix during each round using __________ and permutation
substitutions
The four separate functions of the Advanced Encryption Standard are: permutation, arithmetic operations over a finite field, XOR with a key, and __________ .
byte substitution
Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes, including key exchange, encryption, and ___________ .
decryption
The security of ECC depends on how difficult it is to determine k given kP and P.
True
The addition operation in elliptic curve cryptography is the counterpart of modular multiplication in RSA, and multiple addition is the counterpart of __________ .
modular exponentiation
The key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.
public-key
The security of ElGamal is based on the difficulty of computing discrete logarithms.
True
The purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.
Diffie-Hellman
Asymmetric algorithms are typically much slower than symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.
pseudorandom number
There is not a computational advantage to using ECC with a shorter key length than a comparably secure RSA.
True
The Diffie-Hellman key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.
man-in-the-middle
A considerably larger key size can be used for ECC compared to RSA.
...
Students also viewed
Vocab Gatsby Ch. 5
8 terms
The Watsons Go To Birmingham Chapters 5-8
12 terms
9-23 Vocab Quiz
14 terms
Magnetic Fields
23 terms
Other sets by this creator
Russian Verbs
82 terms
CYBR 7400 Exam 1 Practice
10 terms
Russian Colors
13 terms
Russian Clothes
20 terms
Other Quizlet sets
Microbiology Exam 2
129 terms
the cardiovascular system
40 terms
2022 FCGOs
87 terms
Wellness- Test #1 review
23 terms