Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (21)
A __________ is an attack in which the adversary chooses a number of ciphertexts and is then given the corresponding plaintexts, decrypted with the target's private key.
chosen ciphertext attack
The __________ indicates that the subscriber identified in the certificate has sole control and access to the private key.
public key certificate
A __________ is one that maps a domain into a range such that every function value has a unique inverse, with the condition that the calculation of the function is easy, whereas the calculation of the inverse is infeasible.
The sender 'signs' a message with its private key. Signing is achieved by a cryptographic algorithm applied to the message or to a small block of data that is a function of the message," is a description of a
__________ depend on the running time of the decryption algorithm.
Two issues to consider with the computation required to use RSA are encryption/decryption and __________ .
The difficulty of attacking __________ is based on the difficulty of finding the prime factors of a composite number.
The __________ is a set of policies, processes, server platforms, software and workstations used for the purpose of administering certificates and public-private key pairs, including the ability to issue, maintain, and revoke public key certificates.
public key infrastructure
In the Advanced Encryption Standard the decryption algorithm is identical to the encryption algorithm.
AES processes the entire data block as a single matrix during each round using __________ and permutation
The four separate functions of the Advanced Encryption Standard are: permutation, arithmetic operations over a finite field, XOR with a key, and __________ .
Elliptic curve arithmetic can be used to develop a variety of elliptic curve cryptography schemes, including key exchange, encryption, and ___________ .
The security of ECC depends on how difficult it is to determine k given kP and P.
The addition operation in elliptic curve cryptography is the counterpart of modular multiplication in RSA, and multiple addition is the counterpart of __________ .
The key exchange protocol vulnerability can be overcome with the use of digital signatures and __________ certificates.
The security of ElGamal is based on the difficulty of computing discrete logarithms.
The purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.
Asymmetric algorithms are typically much slower than symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.
There is not a computational advantage to using ECC with a shorter key length than a comparably secure RSA.
The Diffie-Hellman key exchange protocol is vulnerable to a __________ attack because it does not authenticate the participants.
A considerably larger key size can be used for ECC compared to RSA.
Students also viewed
Vocab Gatsby Ch. 5
The Watsons Go To Birmingham Chapters 5-8
9-23 Vocab Quiz
Other sets by this creator
CYBR 7400 Exam 1 Practice
Other Quizlet sets
Microbiology Exam 2
the cardiovascular system
Wellness- Test #1 review