Last Modified: 2012-12-05
The number of horizontal and vertical pixels captured and recorded is known as the image’s depth.
____ attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem.
1. Man-in-the-middle 2. Dictionary
3. Timing 4. Correlation
In a(n) word attack, the attacker encrypts every word in a dictionary using the same cryptosystem as used by the target. T/F
Encryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood. T/F
____ is an integrated system of software, encryption methodologies, protocols, legal agreements, and third-party services that enables users to communicate securely.
____ was developed by Phil Zimmermann and uses the IDEA Cipher for message encoding.
____ is the process of converting an original message into a form that is unreadable to unauthorized individuals.
You cannot combine the XOR operation with a block cipher operation.
To perform the Caesar cipher encryption operation, the pad values are added to numeric values that represent the plaintext that needs to be encrypted.
Bit stream methods commonly use algorithm functions like the exclusive OR operation (____).
1. XOR 2. EOR 3. OR 4. NOR
Internet Protocol Security is designed to protect data integrity, user confidentiality, and authenticity at the IP packet level.
In transport mode the entire IP packet is encrypted and is then placed as the content portion of another IP packet.
Hashing functions require the use of keys.
Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message.
____ is the information used in conjunction with an algorithm to create the ciphertext from the plaintext or derive the plaintext from the ciphertext.
____ is the entire range of values that can possibly be used to construct an individual key.
3. Cryptogram 4. Algorithm
A(n) key is the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message.
A method of encryption that requires the same secret key to encipher and decipher the message is known as ____ encryption.
As DES became known as being too weak for highly classified communications, Double DES was created to provide a level of security far beyond that of DES.
Attackers may conduct an encrypted-plaintext attack by sending potential victims a specific text that they are sure the victims will forward on to others.
Words From Our Students
"StudyBlue is great for studying. I love the study guides, flashcards, and quizzes. So extremely helpful for all of my classes!"
Alice, Arizona State University
"I'm a student using StudyBlue, and I can 100% say that it helps me so much. Study materials for almost every subject in school are available in StudyBlue. It is so helpful for my education!"
Tim, University of Florida
"StudyBlue provides way more features than other studying apps, and thus allows me to learn very quickly! I actually feel much more comfortable taking my exams after I study with this app. It's amazing!"
Jennifer, Rutgers University
"I love flashcards but carrying around physical flashcards is cumbersome and simply outdated. StudyBlue is exactly what I was looking for!"