18 Questions
What does the term 'cryptography' mean in Greek?
Secret writing
Which cryptographic technique is used to transform messages to become secure against all forms of attack?
Cryptography in general
In symmetric key encipherment, what is shared between the communicating parties?
Shared secret key
In asymmetric key encipherment, which key is used to encrypt the data being sent?
Public key
What is the purpose of hashing in cryptography?
To create a fixed-length digest message from the original message
Which cryptographic technique is used to hide a message within another text or image?
Steganography
What is the primary purpose of encipherment as described in the text?
To hide data and maintain its confidentiality
Which term refers to the process of adding check values to data for the recipient to verify the integrity of data?
Data Integrity
How does a digital signature help in confirming a sender's identity?
By allowing the recipient to verify the sender's signature electronically
Which encryption technology mentioned in the text is used for hiding data within images?
Steganography
What is the role of a recipient when verifying data integrity using check values?
Computing the check values themselves on the received data
In the context of security mechanisms, what is the function of digital signatures?
Verifying the authenticity of senders
Which of the following is NOT a security mechanism discussed in the text?
Cryptography
What is the primary purpose of the Notarization security mechanism?
To prevent parties from denying their actions in a communication
Which security mechanism involves switching between different routing methods to confuse potential eavesdroppers?
Routing Control
What is the purpose of the Traffic Padding security mechanism?
To add non-useful data to real data, making the data as a whole misleading for data traffic analysis attacks
Which security mechanism is used to determine user access permissions to data and resources owned by the system?
Access Control
What is the primary purpose of the Authentication Exchange security mechanism?
To verify the identities of communicating parties
Study Notes
Cryptography
- Cryptography refers to the science and art of transforming messages to become secure against all forms of attack.
- It involves three techniques: Symmetric key encipherment, Asymmetric key encipherment, and Hashing.
Symmetric Key Encipherment
- Uses a shared secret key between the communicating parties.
- Encryption is performed using a single key.
Asymmetric Key Encipherment
- Uses two keys: a public key and a private key.
- Data is encrypted using the public key of the receiving party.
- The private key is used for decryption.
Hashing
- Creates a Fixed-length Digest Message from the content of the message.
- The resulting digest message is much smaller than the original message.
Security Mechanisms
- Encipherment: hides data to maintain confidentiality.
- Data Integrity: adds check values to the data to verify its integrity.
- Digital Signature: allows the sender to electronically sign data and the recipient to verify the signature.
- Authentication Exchange: verifies the identity of both parties through message exchange.
- Traffic Padding: adds non-useful data to real data to mislead data traffic analysis attacks.
- Routing Control: selects and switches between routing methods to confuse eavesdroppers.
- Notarization: uses a trusted third party to control communication and prevent denial.
- Access Control: determines user access permissions to data and resources based on passwords or secret codes.
Explore an overview of security mechanisms and techniques for database security, including encipherment for maintaining confidentiality. Learn about encryption technologies like steganography and cryptography, essential for building a robust security service.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free