Term
| What two areas does Cryptology cover? |
|
Definition
| Cryptanalysis and Cryptography |
|
|
Term
| What is another name for a key in Cryptography? |
|
Definition
|
|
Term
| What do we call the maximum number of keys available in cryptography? |
|
Definition
|
|
Term
| Adding additional material to the plaintext message before it is encrypted to assist with encryption is known as __________? |
|
Definition
|
|
Term
| ______________ is a term used to represent a weakness that would exist in a cryptosystem if two keys would generate the same cyphertext from the same plaintext. |
|
Definition
|
|
Term
| The _________ is a random value that is XOR'd with the plaintext message before encryption. |
|
Definition
|
|
Term
| _______________ is an estimate of the effort/time needed to overcome a protective measure by an attacker with specified expertise and resources. |
|
Definition
|
|
Term
| ____________ States that the strength of a cryptosystem is based on the secrecy of the key and not the secrecy of the algorithm. |
|
Definition
|
|
Term
| ________________ Use the same key for encryption and decryption. |
|
Definition
|
|
Term
| ________________ Use different keys for encryption and decryption. |
|
Definition
| Asymmetric key algorithms |
|
|
Term
| What is Quantum Cryptography? |
|
Definition
| Using single-photon light emissions to provide secure key negotiation |
|
|
Term
| What is a major disadvantage of Link Encryption? |
|
Definition
| Since the address information is encrypted, the entire message must be decrypted several times in transit |
|
|
Term
| What two concepts did Claude Shannon describe when writing his Communication Theory of Secrecy Systems? |
|
Definition
|
|
Term
| How does Claude Shannon define confusion? |
|
Definition
| The principle of hiding patterns in the plaintext by means of substitution |
|
|
Term
| How does Claude Shannon define Diffusion? |
|
Definition
| The property of transposing the input plaintext through the ciphertext so that a character in the ciphertext will not directly line up with the corresponding plaintext character |
|
|
Term
| What is the practice of hiding one piece of information inside of another? |
|
Definition
|
|
Term
| What type of encryption is typically used for encrypting small independent blocks of information? |
|
Definition
|
|
Term
| What type of encryption does SSH use? |
|
Definition
|
|
Term
| What two values must be shared in Cipher Block Chaining? |
|
Definition
| The Initialization Vector as well as the key |
|
|
Term
| What type of encryption is similar to CBC, but is used to encrypt streaming communications? |
|
Definition
|
|
Term
| What is the risk in using a Counter? |
|
Definition
| If the counter repeats itself it offers little more than ECB provides. |
|
|
Term
| What is the true key size of DES? |
|
Definition
|
|
Term
|
Definition
| Advanced Encryption Standard |
|
|
Term
| What Block sizes are available with AES? |
|
Definition
|
|
Term
| AES is is unique in that it has a variable number of __________. |
|
Definition
|
|
Term
| Which ciphers were created by Ron Rivest? |
|
Definition
|
|
Term
| Which Ron Rivest Cipher is a stream cypher? |
|
Definition
|
|
Term
| The ability to encrypt something with a widely available public key and only decrypt with a secret private key is known as what type of encryption? |
|
Definition
| Asymmetric Key Cryptography |
|
|
Term
| What do Public Key Algorithms ensure? |
|
Definition
| Confidentiality and Proof of Origin |
|
|
Term
| ___________ Allows two entities to negotiate a session key that can be used to exchange secret information, without ever revealing their private keys. |
|
Definition
|
|
Term
| What do Message Integrity Controls detect? |
|
Definition
|
|
Term
| What do hashing functions detect? |
|
Definition
|
|
Term
| _________ is used to authenticate a message by using a secret key as an input with which to produce a tag? |
|
Definition
| Message Authentication Code |
|
|
Term
| What two things do digital signature guarantee? |
|
Definition
| Non-repudiation of Origin and Integrity of Message |
|
|
Term
| __________ Specifies the standard layout for public key certificates and certificate revocation lists. |
|
Definition
|
|
Term
| The _____________ is an agreement between several countries that governs the movement of cryptographic algorithms between those countries. |
|
Definition
|
|
Term
|
Definition
| Bind a public key to its owner |
|
|
Term
| _________ act as a trusted third party to validate the owners of public keys. |
|
Definition
|
|
Term
| ___________ trust models operate because the entities trust enough people in common to make it unreasonable for everyone to be subverted. |
|
Definition
|
|
Term
| __________ Trust models operate in a manner which each entity puts its trust in a parent organization, checking higher and higher levels until there is a common organization, then working back down to the levels to the destination entity. |
|
Definition
|
|
Term
| _______ is the art and science of breaking codes. |
|
Definition
|
|
Term
| What three things should be considered in order to protect keys from being discovered through cryptanalysis? |
|
Definition
1. The algorithm must be functionally complex. 2. The relationship between key and keystream should not be easy to determine. 3. The keystream generation should be statistically unpredictable |
|
|
Term
| What are the two factors determine the feasibility of a Brute Force attack? |
|
Definition
|
|
Term
| What are the two components of Moore's Law? |
|
Definition
1. Processing Speed doubles every 18 months at the same price. 2. Advances in technology and computing performance will always make brute force an increasingly practical attack on keys of a fixed length. |
|
|
Term
| In a _________________ attack, the attacker has both the plain text and the cipher text and uses them to try to determine the key or cryptovariable used in the encryption process. |
|
Definition
|
|
Term
| ________________ attacks are particularly relevant in the case of asymmetric key cryptography where the attacker has the ability to encrypt any desired plaintext using the public key. |
|
Definition
|
|
Term
| In a ____________ attack, the attacker has access to the encrypted text but may not know the system that was used to generate it. |
|
Definition
|
|
Term
| In a _____________ attack, the attacker has access to ciphertext and the system used to generate it. |
|
Definition
|
|
Term
| A _______ attack hashes common words or password combinations to obtain a collision. |
|
Definition
|
|
Term
| In which type of cryptanalytic attack is a cryptosystem's work factor MOST relevant? |
|
Definition
|
|
Term
| Which algorithm created by Ron Rivest is used for stream ciphers? |
|
Definition
|
|
Term
| WEP and WPA use which cipher? |
|
Definition
|
|
Term
| ______________ is the process of hiding information in photos, music, and videos in such a way as to make the alteration invisible to casual observers. |
|
Definition
|
|
Term
| ___________ is used commonly to help two parties agree on a session key without exchanging secret information. |
|
Definition
|
|
Term
| _____________ combine a hash function with a shared symmetrical key. |
|
Definition
|
|
Term
| _____________combine a hash function with an asymmetric key. |
|
Definition
|
|
Term
| What is the MOST significant advantage that AES offers over DES? |
|
Definition
|
|
Term
| For what application is Electronic Code Book most acceptable? |
|
Definition
|
|
Term
| What is the best way to verify that a digital signature is valid? |
|
Definition
| Obtain a public key certificate and verify the digital signature using that key |
|
|
Term
| Two different input values that result in the same message digest value is known as a _______________. |
|
Definition
|
|
Term
| What would likely be the first step in the establishment of an encrypted session using hybrid encryption systems such as SSL or IPSec? |
|
Definition
|
|
Term
| ___________ provides the ability to verify the authenticity of public keys. |
|
Definition
|
|
Term
| When should a CA place a certificate on a CRL? |
|
Definition
| When the private key of the certificate owner has been compromised. |
|
|
Term
| What is the best way to verify the person who initiated a transaction? |
|
Definition
| Have the person encrypt the hash with his or her private key |
|
|