Filters
Question type

Study Flashcards

Triple DES takes a plaintext block of 64 bits and a key of 56 bits toproduce a ciphertext block of 64 bits.

Correct Answer

verifed

verified

Also referred to as single-key encryption, the universal technique for providing confidentiality for transmitted or stored data is __________ .

Correct Answer

verifed

verified

symmetric ...

View Answer

Symmetric encryption is used primarily to provide confidentiality.

Correct Answer

verifed

verified

There are two general approaches to attacking a symmetric encryption scheme:cryptanalytic attacks and __________ attacks.

Correct Answer

verifed

verified

Public-key encryption was first publicly proposed by __________ in 1976.

Correct Answer

verifed

verified

The purpose of the __________ algorithm is to enable two users to securely reach agreement about a shared secret that can be used as a secret key for subsequent symmetric encryption of messages.

Correct Answer

verifed

verified

Diffie-Hellman Key Agreement

Public-key algorithms are based on simple operations on bit patterns.

Correct Answer

verifed

verified

False

A __________ stream is one that is unpredictable without knowledge of the input key and which has an apparently random character.

Correct Answer

verifed

verified

A __________ attack exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

Correct Answer

verifed

verified

The __________ algorithm takes the ciphertext and the secret key and producesthe original plaintext.

Correct Answer

verifed

verified

The original message or data that is fed into the algorithm is __________.


A) encryption algorithm
B) secret key
C) decryption algorithm
D) plaintext

Correct Answer

verifed

verified

The simplest approach to multiple block encryption is known as __________ mode, in which plaintext is handled b bits at a time and each block of plaintext is encrypted using the same key.

Correct Answer

verifed

verified

electronic...

View Answer

Combined one byte at a time with the plaintext stream using the XOR operation, a __________ is the output of the pseudorandom bit generator.


A) keystream
B) digital signature
C) secure hash
D) message authentication code

Correct Answer

verifed

verified

On average, __________ of all possible keys must be tried in order to achieve success with a brute-force attack.


A) one-fourth
B) half
C) two-thirds
D) three-fourths

Correct Answer

verifed

verified

The strength of a hash function against brute-force attacks dependssolely on the length of the hash code produced by the algorithm.

Correct Answer

verifed

verified

Two of the most important applications of public-key encryption aredigital signatures and key management.

Correct Answer

verifed

verified

__________ is a block cipher in which the plaintext and ciphertext are integers between 0 and n-1 for some n.


A) DSS
B) RSA
C) SHA
D) AES

Correct Answer

verifed

verified

The secret key is input to the encryption algorithm.

Correct Answer

verifed

verified

True

Transmitted data stored locally are referred to as __________ .


A) ciphertext
B) DES
C) data at rest
D) ECC

Correct Answer

verifed

verified

__________ is the scrambled message produced as output.


A) Plaintext
B) Ciphertext
C) Secret key
D) Cryptanalysis

Correct Answer

verifed

verified

Showing 1 - 20 of 45

Related Exams

Show Answer