Get started today!
Good to have you back!
If you've signed in to StudyBlue with Facebook in the past, please do that again.

- StudyBlue
- New Mexico
- University of New Mexico
- Chapter 8

Lauren C.

True

With Diffie-Hellman, asymmetric encryption is used to exchange __session__ keys.

Timing

In a(n) ____ attack, the attacker eavesdrops during the victim’s session and uses statistical analysis of the user’s typing patterns and inter-keystroke timings to discern sensitive session information.

1. timing 2. dictionary 3. replay 4. correlation
Advertisement

XOR

Bit stream methods most commonly use functions like the exclusive OR operation (_____).

1. OR 2. NOR 3. XOR 4. EOR
False

In a(n) __word__ attack, the attacker encrypts every word in a dictionary using the same cryptosystem as used by the target.

RSA

The ____ algorithm was the first public key encryption algorithm developed (in 1977) and published for commercial use.

1. RSA 2. DES 3. AES 4. MAC
Encrytion

____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.

1. Decryption 2. Cryptology 3. Cryptography 4. Encryption
False

In 1953, Giovan Batista Belaso introduced the idea of the passphrase (password) as a key for encryption.

False

Hashing functions require the use of keys.

True

The AES implements a block cipher called the Rijndael __Block__ Cipher.

symmetric

A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.

1. symmetric 2. asymmetric 3. public 4. private
False

Advertisement

Hash

____ functions are mathematical algorithms that generate a message summary or digest to confirm the identity of a specific message and to confirm that there have not been any changes to the content.

1. Hash 2. Encryption 3. Key 4. Map
True

In 1917, Gilbert S.Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key.

False

A(n) __key__ is the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message.

True

Secure Electronic Transactions was developed by MasterCard and VISA in 1997 to provide protection from electronic payment fraud.

False

The asymmetric encryption systems are based on using a single key to both encrypt and decrypt a message.

False

The number of horizontal and vertical pixels captured and recorded is known as the image’s __depth__.

CRL

The CA periodically distributes a(n) ____ to all users that identifies all revoked certificates

1. MAC 2. RA 3. CRL 4. AES
True

polyalphabetic

Substitution ciphers that use two or more alphabets, and are referred to as ____ substitutions.

1. monoalphabetic 2. multialphabetic 3. polyalphabetic 4. polynomic
AES

____ is a Federal Information Processing Standard that specifies a cryptographic algorithm that is used within the U.S. government to protect information at federal agencies that are not a part of the national defense infrastructure.

1. 3DES 2. DES 3. 2DES 4. AES
True

The encapsulating security payload protocol provides confidentiality services for IP packets across insecure networks.

True

A(n) __man-in-the-middle__ attack attempts to intercept a public key or even to insert a known key structure in place of the requested public key.

True

Internet Protocol __Security__ is designed to protect data integrity, user confidentiality, and authenticity at the IP packet level.

False

ESP in __transport__ mode can be used to establish a virtual private network, assuring encryption and authentication between networks communicating across the Internet.

True

Julius Caesar was associated with an early version of the transposition cipher.

True

A(n) __distinguished__ name uniquely identifies a certificate entity, to a user’s public key.

False

A(n) __response__ attack is an attempt to resubmit a recording of the deciphered authentication to gain entry into a secure source.

160

SHA-1 produces a(n) _____-bit message digest, which can then be used as an input to a digital signature algorithm.

1. 160 2. 56 3. 48 4. 256
Digital signatures

____ are encrypted messages that can be mathematically proven to be authentic.

1. Message certificates 2. MAC 3. Digital signatures 4. Message digests
AH

The ____ protocol provides system to system authentication and data integrity verification, but does not provide secrecy for the content of a network communication.

1. HA 2. SEP 3. AH 4. ESP
Work Factor

____ is the amount of effort (usually in hours) required to perform cryptanalysis on an encoded message so that it may be decrypted when the key or algorithm (or both) are unknown.

1. Code 2. Key 3. Algorithm 4. Work factor
PGP

____ is a hybrid cryptosystem originally designed in 1991 by Phil Zimmermann.

1. DES 2. AH 3. PGP 4. ESP
False

The AES algorithm was the first public key encryption algorithm.

"StudyBlue is great for studying. I love the study guides, flashcards and quizzes. So extremely helpful for all of my classes!"

Alice , Arizona State University"I'm a student using StudyBlue, and I can 100% say that it helps me so much. Study materials for almost every subject in school are available in StudyBlue. It is so helpful for my education!"

Tim , University of Florida"StudyBlue provides way more features than other studying apps, and thus allows me to learn very quickly!Â I actually feel much more comfortable taking my exams after I study with this app. It's amazing!"

Jennifer , Rutgers University"I love flashcards but carrying around physical flashcards is cumbersome and simply outdated. StudyBlue is exactly what I was looking for!"

Justin , LSU