Cryptography and Network Security

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Listen to an AI-generated conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which of the following is a primary goal of cryptography?

  • Data Compression
  • Error Correction
  • Increase processing speed
  • Protecting information confidentiality (correct)

What is a VPN primarily utilized for?

  • Reducing the cost of internet services
  • Creating a secure connection over a network (correct)
  • Playing online games
  • Increasing computer processing speed

In cryptography, what does integrity ensure?

  • Data is compressed efficiently
  • Data transmission is faster
  • Data remains unchanged and reliable (correct)
  • Data can be accessed quickly

What is the purpose of authentication in cryptographic services?

<p>To verify the identity of the sender (A)</p>
Signup and view all the answers

What is symmetric encryption?

<p>Encryption that uses the same key for encryption and decryption (C)</p>
Signup and view all the answers

Which of the following is a characteristic of asymmetric encryption?

<p>It uses a pair of keys to encrypt and decrypt. (B)</p>
Signup and view all the answers

What is the purpose of hashing?

<p>To ensure data integrity (C)</p>
Signup and view all the answers

Which of the following is a method for peer authentication?

<p>Using public keys (D)</p>
Signup and view all the answers

What is the main goal of key management in cryptography?

<p>To securely generate, exchange, store, and use cryptographic keys (A)</p>
Signup and view all the answers

What is the purpose of a digital certificate?

<p>To verify identity (D)</p>
Signup and view all the answers

Which of these is a service provided by cryptography?

<p>Data authentication (B)</p>
Signup and view all the answers

What does IPSec do?

<p>It is a suite of protocols that secures Internet Protocol communications. (D)</p>
Signup and view all the answers

What is a man-in-the-middle attack?

<p>An attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other (C)</p>
Signup and view all the answers

In asymmetric encryption, what is the private key used for?

<p>Decrypting data (B)</p>
Signup and view all the answers

What is the purpose of a Certificate Authority (CA)?

<p>To issue digital certificates (A)</p>
Signup and view all the answers

Which algorithm falls under the category of hashing algorithm?

<p>MD5 (A)</p>
Signup and view all the answers

What is the weakness of symmetric encryption?

<p>The sender and receiver must somehow exchange the key securely (B)</p>
Signup and view all the answers

What is the main function of Diffie-Hellman?

<p>Key-exchange (A)</p>
Signup and view all the answers

What is a digital signature a proof of?

<p>The data being signed being unalterable (D)</p>
Signup and view all the answers

In PKI framework, where do users obtain their digital certificates?

<p>From CA or Certification Authority (A)</p>
Signup and view all the answers

Cryptography focuses on securing communication through encoding.

<p>True (A)</p>
Signup and view all the answers

VPNs are not related to cryptography.

<p>False (B)</p>
Signup and view all the answers

IPsec only concerns the management of cryptographic keys.

<p>False (B)</p>
Signup and view all the answers

Symmetric encryption uses identical keys for encryption and decryption.

<p>True (A)</p>
Signup and view all the answers

Asymmetric encryption is exclusive to local networks.

<p>False (B)</p>
Signup and view all the answers

Authentication confirms data integrity but not the sender's identity.

<p>False (B)</p>
Signup and view all the answers

Data integrity ensures that information remains unaltered during transit or storage.

<p>True (A)</p>
Signup and view all the answers

Confidentiality involves making data publicly accessible.

<p>False (B)</p>
Signup and view all the answers

Key management is a simple process.

<p>False (B)</p>
Signup and view all the answers

Public key cryptography uses one key.

<p>False (B)</p>
Signup and view all the answers

Encryption transforms plaintext into ciphertext.

<p>True (A)</p>
Signup and view all the answers

Hashing creates the original plain text from cipher text.

<p>False (B)</p>
Signup and view all the answers

HMAC authenticates a message using a secret key.

<p>True (A)</p>
Signup and view all the answers

MD5 is more secure than SHA-256.

<p>False (B)</p>
Signup and view all the answers

A digital certificate proves the bond between a public key and its owner.

<p>True (A)</p>
Signup and view all the answers

Confidentiality is achieved when data is altered during transmission.

<p>False (B)</p>
Signup and view all the answers

Encryption is an example of a CIA service used for integrity.

<p>False (B)</p>
Signup and view all the answers

Digital signatures guarantee that a signature can be reused.

<p>False (B)</p>
Signup and view all the answers

In asymmetric encryption, the keys are identical.

<p>False (B)</p>
Signup and view all the answers

Diffie-Hellman key exchange ensures secure key exchange.

<p>True (A)</p>
Signup and view all the answers

Flashcards

Cryptography

Used to protect the integrity, confidentiality, and authentication of data.

Confidentiality

Ensures that data is only accessible to authorized parties.

Authentication

Verifies the source of the data and confirms that it has not been altered

Integrity

Guarantees that data remains unaltered during transit.

Signup and view all the flashcards

Symmetric Encryption

Uses the same key for both encryption and decryption.

Signup and view all the flashcards

Asymmetric Encryption

Uses different keys for encryption and decryption.

Signup and view all the flashcards

Encryption Algorithms

Predefined procedures or instructions to encrypt data.

Signup and view all the flashcards

Hash Algorithms

Mathematical functions that create a unique, fixed-size "fingerprint" of data.

Signup and view all the flashcards

Fixed-Length Hash Value

A fixed-length value derived from a message, used for verifying data integrity

Signup and view all the flashcards

Authentication Code

A code used to verify both the integrity and authenticity of a message

Signup and view all the flashcards

Diffie-Hellman

Used for secure key exchange over a public network.

Signup and view all the flashcards

Digital Signature

Guarantees the source of a digital document.

Signup and view all the flashcards

Digital Certificate

An electronic document linking a public key with an identity.

Signup and view all the flashcards

Certificate Authority (CA)

An entity that issues digital certificates.

Signup and view all the flashcards

PKI (Public Key Infrastructure)

Framework for managing digital certificates and public-key cryptography.

Signup and view all the flashcards

Registration Authority (RA)

An entity that verifies user identity for a CA.

Signup and view all the flashcards

Encryption

The act of obscuring information to make it unreadable without a special key or knowledge.

Signup and view all the flashcards

Peer Authentication

Ensures the identity of the sender is validated.

Signup and view all the flashcards

Symmetric Key Encryption

A message encrypted with a secret key, ensuring only the intended recipient can read it.

Signup and view all the flashcards

Asymmetric Key Encryption

A system where the encryption and decryption keys are different, enhancing security.

Signup and view all the flashcards

Security of Hash Algorithms

The measurement of how well an encryption method holds up to compromise.

Signup and view all the flashcards

PKI Framework

The structure, policies, and procedures required to create, manage, distribute, use, store, and revoke digital certificates.

Signup and view all the flashcards

Study Notes

Cryptographic Services

  • A diagram illustrates how cryptographic services protect communication between Alice and Bob, involving VPNs, firewalls, IPSec, ESA/WSA, web servers, email servers, and DNS.

Confidentiality with Encryption

  • An example shows Alice paying Jeremy $100, encrypting the message, and Bob decrypting it.
  • An unauthorized user cannot read the encrypted message during internet transmission.

Integrity with Hashing

  • An example shows Alex being paid $100 and Jeremy being paid $1000
  • The hashes alter if the date is changed.
  • An unauthorized user cannot change the data without being discovered.

Authentication

  • An example shows Alice and Bob authenticating with their auth keys, IDs, and authenticating/computed hashes.

Section 7.5: Summary

  • Cryptology areas are explained and two kinds of encryption algorithms are explained.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Parte 23.
25 questions

Parte 23.

ThumbsUpObsidian8119 avatar
ThumbsUpObsidian8119
Cryptography Fundamentals
98 questions
Use Quizgecko on...
Browser
Browser