Podcast
Questions and Answers
In 1953, Giovan Batista Belaso introduced the idea of the passphrase (password) as a key for encryption.
In 1953, Giovan Batista Belaso introduced the idea of the passphrase (password) as a key for encryption.
False
In 1917, Gilbert S. Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key.
In 1917, Gilbert S. Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-repeating random key.
True
Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network decrypts the message sent to it and then reencrypts it using different keys and sends it to the next neighbor. This process continues until the message reaches the final destination.
Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network decrypts the message sent to it and then reencrypts it using different keys and sends it to the next neighbor. This process continues until the message reaches the final destination.
False
The permutation cipher simply rearranges the values within a block to create the ciphertext.
The permutation cipher simply rearranges the values within a block to create the ciphertext.
Signup and view all the answers
In addition to being credited with inventing a substitution cipher, Julius Caesar was associated with an early version of the transposition cipher.
In addition to being credited with inventing a substitution cipher, Julius Caesar was associated with an early version of the transposition cipher.
Signup and view all the answers
You cannot combine the XOR operation with a block cipher operation.
You cannot combine the XOR operation with a block cipher operation.
Signup and view all the answers
To perform the Caesar cipher encryption operation, the pad values are added to numeric values that represent the plaintext that needs to be encrypted.
To perform the Caesar cipher encryption operation, the pad values are added to numeric values that represent the plaintext that needs to be encrypted.
Signup and view all the answers
One encryption method made popular by spy movies is the book cipher, which involves using the text in a book to encrypt and decrypt messages.
One encryption method made popular by spy movies is the book cipher, which involves using the text in a book to encrypt and decrypt messages.
Signup and view all the answers
Hashing functions require the use of keys.
Hashing functions require the use of keys.
Signup and view all the answers
A cryptovariable is a value representing the application of a hash algorithm on a message.
A cryptovariable is a value representing the application of a hash algorithm on a message.
Signup and view all the answers
A brute force function is a mathematical algorithm that generates a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity.
A brute force function is a mathematical algorithm that generates a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity.
Signup and view all the answers
Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.
Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.
Signup and view all the answers
The AES algorithm was the first public-key encryption algorithm to use a 256-bit key length.
The AES algorithm was the first public-key encryption algorithm to use a 256-bit key length.
Signup and view all the answers
When an asymmetric cryptographic process uses the sender's private key to encrypt a message, the sender's public key must be used to decrypt the message.
When an asymmetric cryptographic process uses the sender's private key to encrypt a message, the sender's public key must be used to decrypt the message.
Signup and view all the answers
Asymmetric encryption systems use a single key to both encrypt and decrypt a message.
Asymmetric encryption systems use a single key to both encrypt and decrypt a message.
Signup and view all the answers
Usually, as the length of a cryptovariable increases, the number of random guesses that have to be made in order to break the code is reduced.
Usually, as the length of a cryptovariable increases, the number of random guesses that have to be made in order to break the code is reduced.
Signup and view all the answers
PKI systems are based on public-key cryptosystems and include digital certificates and certificate authorities.
PKI systems are based on public-key cryptosystems and include digital certificates and certificate authorities.
Signup and view all the answers
The registration authority (RA) is a third party that issues, manages, authenticates, signs, and revokes users' digital certificates.
The registration authority (RA) is a third party that issues, manages, authenticates, signs, and revokes users' digital certificates.
Signup and view all the answers
The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public-key encryption.
The most common hybrid system is based on the Diffie-Hellman key exchange, which is a method for exchanging private keys using public-key encryption.
Signup and view all the answers
Steganography is a data hiding method that involves embedding information within other files, such as digital pictures or other images.
Steganography is a data hiding method that involves embedding information within other files, such as digital pictures or other images.
Signup and view all the answers
Standard HTTP (S-HTTP) is an extended version of the Hypertext Transfer Protocol that provides for the encryption of individual messages transmitted via the Internet between a client and server using AES over HTTP.
Standard HTTP (S-HTTP) is an extended version of the Hypertext Transfer Protocol that provides for the encryption of individual messages transmitted via the Internet between a client and server using AES over HTTP.
Signup and view all the answers
SSL builds on the encoding format of the digital encryption standard (DES) protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.
SSL builds on the encoding format of the digital encryption standard (DES) protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.
Signup and view all the answers
Bluetooth is a de facto industry standard for short-range wireless communications between devices.
Bluetooth is a de facto industry standard for short-range wireless communications between devices.
Signup and view all the answers
Secure Electronic Transactions was developed by MasterCard and Visa in 1997 to protect against electronic payment fraud.
Secure Electronic Transactions was developed by MasterCard and Visa in 1997 to protect against electronic payment fraud.
Signup and view all the answers
The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.
The encapsulating security payload protocol provides secrecy for the contents of network communications as well as system-to-system authentication and data integrity verification.
Signup and view all the answers
Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.
Nonrepudiation means that customers or partners can be held accountable for transactions, such as online purchases, which they cannot later deny.
Signup and view all the answers
Adopted by NIST in 1976 as a federal standard, DES uses a 64-bit block size and key.
Adopted by NIST in 1976 as a federal standard, DES uses a 64-bit block size and key.
Signup and view all the answers
3DES was created to offer the same strength as the DES algorithm but ran three times as fast, thus saving time.
3DES was created to offer the same strength as the DES algorithm but ran three times as fast, thus saving time.
Signup and view all the answers
Ciphertext or a cryptogram is an encoded message, or a message that has been successfully encrypted.
Ciphertext or a cryptogram is an encoded message, or a message that has been successfully encrypted.
Signup and view all the answers
In a book cipher, the key consists of a list of codes representing the page number, line number, and word number of the plaintext word.
In a book cipher, the key consists of a list of codes representing the page number, line number, and word number of the plaintext word.
Signup and view all the answers
Hash algorithms are mathematical functions that create a message digest by converting variable-length messages into a single fixed-length value.
Hash algorithms are mathematical functions that create a message digest by converting variable-length messages into a single fixed-length value.
Signup and view all the answers
Encryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood.
Encryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood.
Signup and view all the answers
A multipart authentication code (MAC) is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.
A multipart authentication code (MAC) is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest.
Signup and view all the answers
Encryption methodologies that require the same secret key to encipher and decipher the message are using public-key encryption.
Encryption methodologies that require the same secret key to encipher and decipher the message are using public-key encryption.
Signup and view all the answers
PKI is the a federal information processing standard that specifies a cryptographic algorithm developed to replace both DES and 3DES.
PKI is the a federal information processing standard that specifies a cryptographic algorithm developed to replace both DES and 3DES.
Signup and view all the answers
AES implements a block cipher called the Rijndael Block Cipher with a variable block length and a key length of 128, 192 or 256 bits.
AES implements a block cipher called the Rijndael Block Cipher with a variable block length and a key length of 128, 192 or 256 bits.
Signup and view all the answers
Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message.
Symmetric encryption uses two different but related keys, and either key can be used to encrypt or decrypt the message.
Signup and view all the answers
Within a PKI, a(n) registration authority issues, manages, authenticates, signs, and revokes users' digital certificates, which typically contain the user name, public key, and other identifying information.
Within a PKI, a(n) registration authority issues, manages, authenticates, signs, and revokes users' digital certificates, which typically contain the user name, public key, and other identifying information.
Signup and view all the answers
The Digital Signature Standard established by NIST is used for electronic document authentication by federal information systems. It is based on a variant of the ElGamal algorithm.
The Digital Signature Standard established by NIST is used for electronic document authentication by federal information systems. It is based on a variant of the ElGamal algorithm.
Signup and view all the answers
A(n) distinguished name uniquely identifies a certificate entity to a user's public key.
A(n) distinguished name uniquely identifies a certificate entity to a user's public key.
Signup and view all the answers
Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys - limited use symmetric keys for temporary communications.
Diffie-Hellman key exchange uses asymmetric encryption to exchange session keys - limited use symmetric keys for temporary communications.
Signup and view all the answers
HTTPS is an extended version of Hypertext Transfer Protocol that provides for the encryption of protected e-mail transmitted via the Internet between a client and server.
HTTPS is an extended version of Hypertext Transfer Protocol that provides for the encryption of protected e-mail transmitted via the Internet between a client and server.
Signup and view all the answers
Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures.
Privacy Enhanced Mail was proposed by the Internet Engineering Task Force and is a standard that uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures.
Signup and view all the answers
Secure Multipurpose Internet Mail Extensions builds on the encoding format of the MIME protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.
Secure Multipurpose Internet Mail Extensions builds on the encoding format of the MIME protocol and uses digital signatures based on public-key cryptosystems to secure e-mail.
Signup and view all the answers
In IPSec transport mode, only the IP data is encrypted, not the IP headers.
In IPSec transport mode, only the IP data is encrypted, not the IP headers.
Signup and view all the answers
Originally released as freeware, Pretty Good Privacy is a hybrid cryptosystem that combines some of the best available cryptographic algorithms as an open-source de facto standard for encryption and authentication of e-mail and file storage.
Originally released as freeware, Pretty Good Privacy is a hybrid cryptosystem that combines some of the best available cryptographic algorithms as an open-source de facto standard for encryption and authentication of e-mail and file storage.
Signup and view all the answers
The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption is called cryptanalysis.
The process of obtaining the plaintext message from a ciphertext message without knowing the keys used to perform the encryption is called cryptanalysis.
Signup and view all the answers
The science of encryption is known as .
The science of encryption is known as .
Signup and view all the answers
Is the process of making and using codes to secure the transmission of information.
Is the process of making and using codes to secure the transmission of information.
Signup and view all the answers
A(n) or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption.
A(n) or cryptosystem is an encryption method or process encompassing the algorithm, key(s) or cryptovariable(s), and procedures used to perform encryption and decryption.
Signup and view all the answers
To means to encrypt, encode, or convert plaintext into the equivalent ciphertext.
To means to encrypt, encode, or convert plaintext into the equivalent ciphertext.
Signup and view all the answers
The process of hiding messages within the digital encoding of a picture or graphic is called .
The process of hiding messages within the digital encoding of a picture or graphic is called .
Signup and view all the answers
In a(n) cipher, you replace one value with another.
In a(n) cipher, you replace one value with another.
Signup and view all the answers
A(n) substitution uses one alphabet.
A(n) substitution uses one alphabet.
Signup and view all the answers
The cipher simply rearranges the values within a block to create the ciphertext.
The cipher simply rearranges the values within a block to create the ciphertext.
Signup and view all the answers
The operation is a function of Boolean algebra in which two bits are compared, and if the two bits are identical, the result is a binary 0.
The operation is a function of Boolean algebra in which two bits are compared, and if the two bits are identical, the result is a binary 0.
Signup and view all the answers
Also known as the one-time pad, the cipher, which was developed at AT&T, uses a set of characters only one time for each encryption process.
Also known as the one-time pad, the cipher, which was developed at AT&T, uses a set of characters only one time for each encryption process.
Signup and view all the answers
A message is a fingerprint of the author's message that is compared with the recipient's locally calculated hash of the same message.
A message is a fingerprint of the author's message that is compared with the recipient's locally calculated hash of the same message.
Signup and view all the answers
Hashing functions do not require the use of keys, but it is possible to attach a message code to allow only specified recipients to access the message digest.
Hashing functions do not require the use of keys, but it is possible to attach a message code to allow only specified recipients to access the message digest.
Signup and view all the answers
The Secure Standard issued by the National Institute of Standards and Technology specifies secure algorithms, such as SHA-1, for computing a condensed representation of a message or data file.
The Secure Standard issued by the National Institute of Standards and Technology specifies secure algorithms, such as SHA-1, for computing a condensed representation of a message or data file.
Signup and view all the answers
One of the most widely known cryptographic algorithms is the which was developed by IBM and is based on the company’s Lucifer algorithm.
One of the most widely known cryptographic algorithms is the which was developed by IBM and is based on the company’s Lucifer algorithm.
Signup and view all the answers
The successor to 3DES is the Encryption Standard.
The successor to 3DES is the Encryption Standard.
Signup and view all the answers
The more common name for asymmetric encryption is _key encryption.
The more common name for asymmetric encryption is _key encryption.
Signup and view all the answers
A mathematical is a secret mechanism that enables you to easily accomplish the reverse function in a one-way function.
A mathematical is a secret mechanism that enables you to easily accomplish the reverse function in a one-way function.
Signup and view all the answers
In the context of a PKI, a(n) authority operates under the trusted collaboration of the certificate authority and can be delegated day-to-day certification functions, such as verifying registration information about new registrants, generating end-user keys, revoking certificates, and validating that users possess a valid certificate.
In the context of a PKI, a(n) authority operates under the trusted collaboration of the certificate authority and can be delegated day-to-day certification functions, such as verifying registration information about new registrants, generating end-user keys, revoking certificates, and validating that users possess a valid certificate.
Signup and view all the answers
Digital are public-key container files that allow computer programs to validate the key and identify to whom it belongs. The certificate is often issued and certified by a third party, usually a certificate authority. A certificate authority (CA) issues, manages, authenticates, signs, and revokes users’ digital certificates, which typically contain the user name, public key, and other identifying information.
Digital are public-key container files that allow computer programs to validate the key and identify to whom it belongs. The certificate is often issued and certified by a third party, usually a certificate authority. A certificate authority (CA) issues, manages, authenticates, signs, and revokes users’ digital certificates, which typically contain the user name, public key, and other identifying information.
Signup and view all the answers
Are encrypted messages that can be mathematically proven to be authentic.
Are encrypted messages that can be mathematically proven to be authentic.
Signup and view all the answers
Is an electronic document or container file that contains a key value and identifying information about the entity that controls the key.
Is an electronic document or container file that contains a key value and identifying information about the entity that controls the key.
Signup and view all the answers
Study Notes
Cryptography Study Notes
- Cryptography is the science of encryption
- Cryptanalysis is the process of deciphering encrypted messages.
- Ciphertext is an encoded message
- Plaintext is the original message before encryption.
- Key is a sequence of characters used in conjunction with an algorithm to encrypt and decrypt messages.
- Algorithm is a set of instructions to change plaintext into ciphertext
- Hash functions are mathematical algorithms used to create a message digest that confirms the identity of a message and confirms there are no changes to the content.
- Digital certificates are public-key container files that allow computer programs to validate keys and identifying information.
- P(ublic) K(ey) I(nfrastructure) (PKI) is a system that consists of software, encryption methodologies, protocols, legal agreements and third-party services to facilitate secure communications.
- Steganography is a data hiding method using a cover file such as a picture or image to hide information within the cover file.
- Symmetric encryption uses the same key to encrypt and decrypt a message
- Asymmetric encryption uses two different but related keys. Either key can be used to encrypt or decrypt a message; one key is private, the other is public.
- Cipher can use substitution or transposition
- Password is a sequence of characters used by an authorized user to access a system
- XOR operation is a bitwise operation comparing two different values to create a third value.
- Block cipher an encryption algorithm with a block size often used for digital encryption.
- One time pad is a method used to encrypt a message by using a unique key for each encryption process.
- Digital Signature Standard (DSS) is a U.S. federal information processing standard for digital signatures.
- Advanced Encryption Standard (AES) is a symmetric-key algorithm used in government to protect information.
- Pretty Good Privacy (PGP) is a popular cryptographic algorithm that has become a standard for e-mail and file encryption.
- RSA is a popular public-key encryption algorithm; keys are created, one published and one private.
Cryptography History
- Significant events and discoveries in the history of cryptography are covered, including important figures and pivotal points in the development of cryptographic systems. This also includes early forms of cipher development.
Major Cryptographic Protocols
- Covers significant details about major protocols used for secure communication including SSL, HTTPS, TLS etc.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the essential concepts of cryptography and cryptanalysis through this quiz. Understand key terms such as ciphertext, plaintext, algorithms, and hash functions. This quiz will test your knowledge of encryption methodologies and digital security.