WGU Course C839 - Intro to Cryptography Quizlet by Brian Mac Farlane Flashcards Quizlet PDF

Title WGU Course C839 - Intro to Cryptography Quizlet by Brian Mac Farlane Flashcards Quizlet
Course Managing Information Security
Institution Western Governors University
Pages 18
File Size 402.8 KB
File Type PDF
Total Downloads 94
Total Views 126

Summary

quizlet for c839 - intro to cryptography by Brain...


Description

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

Science / Computer Science / Computer Security and Reliability

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Get access to all your stats, your personal progress dashboard and smart study shortcuts with Quizlet Plus. Unlock Progress

Terms in this set (293) What type of encryption uses different keys to

D

encrypt and decrypt the message? A Symmetric B Private key C Secure D Asymmetric

The most widely used asymmetric encryption

A

algorithm is what? A RSA B Vigenere C DES D Caesar Cipher

Original, unencrypted information is referred to as

B

____. A text B plaintext C cleantext D ciphertext

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

1/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

Which of the following is NOT an asymmetric

D

system? A PGP B RSA C SSL D DES

In order for User A to send User B an encrypted

C

message that only User B can read, User A must encrypt message with which of the following keys? A User A's public key B User A's private key C User B's public key D User B's private key

The greatest weakness with symmetric algorithms is

B

_____. A They are less secure than asymmetric B The problem of key exchange C They are slower than asymmetric D The problem of generating keys

Which of the following is generally true about block

D

sizes? A Smaller block sizes increase security B Block sizes must be more than 256 bits to be secure C Block size is irrelevant to security D Larger block sizes increase security

A _____ is a function that takes a variable-size input m

B

and returns a fixed-size string. A Symmetric cipher B Hash C Asymmetric cipher D Feistel

Which of the following is a cryptographic protocol

D

that allows two parties to establish a shared key over an insecure channel? A Elliptic Curve B RSA C MD5 D Diffie-Hellman

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

2/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

A _________ is a digital representation of information

A

that identifies you as a relevant entity by a trusted third party? A Digital Signature B Hash C Ownership stamp D Digest

What is the standard used by most digital

A

certificates? A X.509 B CRL C RFC 2298 D OCSP

DES uses keys of what size?

A

A 56 bits B 192 bits C 128 bits D 64 bits

Which of the following is NOT a key size used by

A

AES? A 512 bits B 128 bits C 192 bits D 256 bits

Which of the following was a multi alphabet cipher

A

widely used from the 16th century (1553) to the early 20th century (1900s)? A Vigenere B Caesar C Atbash D Scytale

Which of the following is a substitution cipher used

D

by ancient Hebrew scholars? A Caesar B Vigenere C Scytale D Atbash

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

3/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

Shifting each letter in the alphabet a fixed number

D

of spaces to the right or left is an example of what? A Bit shifting B Confusion C Multi substitution D Single substitution

Which of the following most accurately defines

A

encryption? A changing a message so it can only be easily read by the intended recipient B Making binary changes to a message to conceal it C changing a message using complex mathematics D Applying keys to plain text

If you use substitution alone, what weakness is

D

present in the resulting cipher text? A It is the same length as the original text B It is easily broken with modern computers. C It is too simple. D Because it maintains letter and word frequency.

_____ uses at least two different shifts, changing the

B

shift with different letters in the plain text. A Atbash B multi-alphabet encryption C Scytale D Caesar cipher

____ was designed to provide built in cryptography

B

for the clipper chip. A Blowfish B Skipjack C GOST D 3DES

Which of the following uses an 80 bit key on 64 bit

C

blocks? A Twofish B AES C Skipjack D DES

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

4/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

With _____, the message is divided into blocks and

A

each block is encrypted separately. This is the most basic mode for symmetric encryption. A Electronic codebook (ECB) B Cipher-block chaining (CBC) C Cipher feedback (CFB) D Output feedback (OFB)

Which of the following is an example of an

B

unbalanced Feistel? A 3DES B Skipjack C Twofish D AES

This process is done by having each block of

B

plaintext is XORed with the previous ciphertext block before being encrypted. A Output feedback (OFB) B Cipher-block chaining (CBC) C Electronic codebook (ECB) D Cipher feedback (CFB)

The process wherein the ciphertext block is

C

encrypted then the ciphertext produced is XOR'd back with the plaintext to produce the current ciphertext block is called what? A Output feedback (OFB) B Cipher-block chaining (CBC) C Cipher feedback (CFB) D Electronic codebook (ECB)

This is a method for turning a block cipher into a

C

stream cipher by generating a keystream block, which are then XORed with the plaintext blocks to get the ciphertext. A Cipher feedback (CFB) B Electronic codebook (ECB) C Output feedback (OFB) D Cipher-block chaining (CBC)

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

5/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

Which of the following modes can be used to turn a

D

block cipher into a stream cipher? A Propagating cipher-block chaining (PCBC) and Electronic codebook (ECB) B Counter Mode (CTR) and Propagating cipherblock chaining (PCBC) C Electronic codebook (ECB) and Output feedback (OFB) D Output feedback (OFB) and Counter Mode (CTR)

A fixed-size pseudorandom number that is fed into

A

a symmetric cipher to increase randomness is called what? A IV B Key C Chain D Salt

A number that is used only one time then discarded

A

is called what? A Nonce B Chain C Salt D IV

Which of the following is a stream cipher that uses

A

variable length key from 1 to 256 bytes? A RC4 B AES C DESx D DES

This algorithm was published by the German

C

engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers. A RC4 B Blowfish C FISH D Twofish

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

6/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

Which of the following is NOT required for a hash?

A

A Minimum key length of 256 bits B Variable-length input, fixed-length output C Non-reversible D Few collisions

A ______ refers to a situation where two different

C

inputs yield the same output. A Substitution B Convergence C Collision D Transposition

What is a salt?

B

A Key rotation B Random bits intermixed with a hash to increase randomness and reduce collisions. C Random bits intermixed with a symmetric cipher to increase randomness and make it more secure. D Key whitening

RFC 1321 describes what hash?

D

A RIPEMD B SHA1 C GOST D MD5

What size block does FORK256 use?

C

A 256 B 128 C 512 D 64

In 1977 researchers at MIT described what

A

asymmetric algorithm? A RSA B AES C DH D EC

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

7/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

What is the formula (M^e)(%n) related to?

C

A Encrypting with EC B Generating Mersenne primes C Decrypting with RSA D Encrypting with RSA

Which of the following equations is related to EC?

C

A P = Cd%n B Me%n C y2 = x3 + Ax + B D Let m = (p-1)(q-1)

U.S. Patent 5,231,668 and FIPS 186 define what

D

algorithm? A AES B RSA C Elliptic Curve (EC) D Digital Signature Algorithm (DSA)

What is X.509?

D

A The standard for PGP certificates B The standard for encrypting email C The standard for FIPS 186 D The standard for digital certificates

What is contained in a CRL?

C

A Keys for RSA B New certificates C Revoked certificates D Keys for AES

What does the Online Certificate Status Protocol

A

(OCSP) provide? A Revoked certificates B Hashing C VPN connectivity D Encryption

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

8/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

In terms of cryptanalysis, what does it mean to

D

break a cipher? A finding a method to decrypt a message that is at least twice as efficient as brute force B trying every possible key until you can decrypt the message C deploying an algorithm that uses a 228 bit key D finding any method to decrypt the message that is more efficient than brute force

An authentication method that periodically re-

B

authenticates the client by establishing a hash that is then resent from the client is called ______. A PAP B CHAP C SPAP D EAP

What is a TGS?

A

A The server that grants Kerberos tickets B protocol for encryption C protocol for key exchange D The server that escrows keys

What is Kerchoff's principle?

D

A A minimum key size of 256 bits is necessary for security. B Both algorithm and key should be kept secret. C A minimum of 15 rounds is needed for a Feistel cipher to be secure. D Only the key needs to be secret, not the actual algorithm.

Which of the following is a fundamental principle of

B

cryptography that holds that the algorithm can be publically disclosed without damaging security? A Babbage's principle B Kerkchoff's principle C Vigenere's principle D Shamir's principle

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

9/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

A process that puts a message into the least

C

significant bits of a binary file is called what? A Symmetric cryptography B Masking C Steganography D Asymmetric cryptography

If you wished to see a list of revoked certificates

A

from a CA, where would you look? A CRL B CA C RFC D RA

Which of the following is generally true about block

C

ciphers? A Secret block ciphers should be trusted. B Block ciphers permute the bits of the input plaintext. C The plaintext and ciphertext are always the same size. D A block cipher is an encryption function for variable-size blocks of data.

What does the OCSP protocol provide?

D

A encryption B VPN connectivity C hashing D a real time protocol for verifying certificates

U.S. encryption standard that replaced DES. Block

AES

symmetric cipher that uses 128-bit block sizes and various key lengths (128, 192, 256).

DES, 3DES, SHA, AES (some AES implementations

Class 3 Algorithms

are Type I)

Encryption method where the sender and receiver

Symmetric

use an instance of the same key for encryption and decryption purposes.

Block symmetric algorithm chosen by NIST as an

Data Encryption Standard (DES)

encryption standard in 1976. It uses a 56-bit true key bit size, 64-bit block size, and 16 rounds of computation.

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

10/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

technical specification indicating how multimedia

Multipurpose Internet Mail Extensions (MIME)

data and e-mail binary attachments are to be transferred.

Valid data transmission is maliciously or fraudulently

Replay Attack

repeated to allow an entity gain unauthorized access.

protocol suite provides a method of setting up a

Internet Protocol Security (IPSec)

secure channel for protected data exchange between two devices.

Juniper (block cipher)

Class 1 Algorithms

MAYFLY (asymmetric) FASTHASH (hashing) WALBURN (high bandwith link encryption) PEGASUS (satellite telemetry)

Component of a PKI that creates and maintains

Certificate Authority

digital certificates throughout their life cycles.

Uses public key encryption and provides data

Secure Sockets Layer (SSL)

encryption, server authentication, message integrity, and optional client authentication. It is currently at version 3.0.

Manipulating individuals so that they will divulge

Social engineering attack

confidential information, rather than by breaking in or using technical cracking techniques.

Cryptanalysis attack where the attacker is assumed

Ciphertext-only attack

to have access only to a set of ciphertexts.

servers and software signing, for which

Class 3 Certificates

independent verification and checking of identity and authority is done by issuing CA

it should be impossible for any attacker to

BSI Criteria K3 states

calculate, or otherwise guess, from any given subsequence, any previous or future values in the sequence

Cryptanalysis attack that uses identified statistical

Statistical attack

patterns.

organizations for which proof of identity is required

Class 2 Certificates

Block symmetric cipher that uses a 128-bit key and

International Data Encryption Algorithm (IDEA)

64-bit block size.

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

11/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

individuals, and intended for email

A form of cryptanalysis applicable to symmetric key

Class 1 Certificates

Differential cryptanalysis

algorithms that was invented by Eli Biham and Adi Shamir. The examination of differences in an input and how that affects the resultant difference in the output.

Cryptanalysis attack where the attacker is assumed

Known plaintext attack

to have access to sets of corresponding plaintext and ciphertext.

Carries out real-time validation of a certificate and

Online Certificate Status Protocol (OCSP)

reports back to the user whether the certificate is valid, invalid, or unknown. OCSP checks the CRL that is maintained by the CA.

What is the formula Me%n related to?

Plain-text is equal to the encryption function (E)

Encrypting with RSA

P= E(k,c) Symmetric decryption

with the key (k) and the ciphertext (c) being passed as parameters to that function

Not certified for government use

64 bit algorithm operating at 56 bits with an 8 bit

Class 4 algorithms

DES

parity block

AH is the authenticating protocol, and ESP is an

Authentication Header (AH) and Encapsulating Security Payload (ESP).

authenticating and encrypting protocol that uses cryptographic mechanisms to provide source authentication, confidentiality, and message integrity.

developed as a Russian national standard and

GOST

produced fixed length outputs of 256 bits

A measure of the uncertainty associated with a

Entropy

random variable

Attempts to make the statistical frequencies of the

Confusion

ciphertext and actual key as complex as possible

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane https://quizlet.com/429355356/wgu-course-c839-intro-to-cryptography-quizlet-by-brian-macfarlane-flash-cards/

12/18

10/5/21, 6:06 PM

WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane Flashcards | Quizlet

Like AES, Serpent has a block size of 128 bits and

Serpent

can have a key size of 128, 192, or 256 bits. The algorithm is also a substitution-permutation network like AES. It uses 32 rounds working with a block of four 32-bit words. Each round applies one of eight 4-bit to 4-bi...


Similar Free PDFs