Week 6

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

Which protocol uses 3DES symmetric key encryption and RSA for key exchanges and digital signatures?

  • S-HTTP
  • PGP
  • SET
  • PEM (correct)

What is the main purpose of Secure Electronic Transactions (SET)?

  • To provide security to email attachments
  • To encrypt credit card information transfers
  • To secure wireless networks
  • To protect against electronic payment fraud (correct)

Which modern cryptographic cipher is used by Pretty Good Privacy (PGP) for message encoding?

  • 3DES
  • AES
  • RSA
  • IDEA (correct)

Which protocol was an early attempt to provide security for 802.11 networks before being replaced by Wi-Fi Protected Access (WPA)?

<p>WEP (B)</p> Signup and view all the answers

Which protocol allows the encryption of information passing between computers through a protected and secure virtual connection?

<p>SSL (D)</p> Signup and view all the answers

What type of encryption uses Diffie-Hellman key exchange for deriving key material between peers on a public network?

<p>Symmetric encryption (D)</p> Signup and view all the answers

Which encryption protocol provides six services including authentication by digital signatures and message encryption?

<p>IPSec (B)</p> Signup and view all the answers

In the context of secure communication, what does IPSec use Public-key cryptography for?

<p>Signing the Diffie-Hellman exchanges (B)</p> Signup and view all the answers

Which protocol is known for providing improved user authentication using 802.1X and EAP?

<p>WEP Encryption (A)</p> Signup and view all the answers

What is the primary function of Pretty Good Privacy (PGP) in email security?

<p>Message encryption (B)</p> Signup and view all the answers

What is the purpose of Triple DES (3DES)?

<p>To provide security beyond DES with a 64-bit block size and 56-bit key (C)</p> Signup and view all the answers

Which encryption method requires two different keys, one public and one private, for enciphering or deciphering messages?

<p>RSA (B)</p> Signup and view all the answers

In asymmetric encryption, if Key A is used to encrypt a message, which key is required to decrypt it?

<p>Key B (B)</p> Signup and view all the answers

What was the main purpose of developing the Advanced Encryption Standard (AES)?

<p>To replace both DES and 3DES (A)</p> Signup and view all the answers

Where should Rachel store her public key to allow Alex to securely send messages to her?

<p>On a public server for anyone to access (D)</p> Signup and view all the answers

What is steganography?

<p>The technique of encoding digital images in a hidden manner (A)</p> Signup and view all the answers

Which modern version of steganography hides information in digital pictures or other images?

<p>.bmp files (A)</p> Signup and view all the answers

What is the main purpose of Secure Sockets Layer (SSL) protocol?

<p>To provide a secure channel over the public Internet (B)</p> Signup and view all the answers

What does Secure Hypertext Transfer Protocol (S-HTTP) primarily offer?

<p>Encryption of individual messages between client and server (A)</p> Signup and view all the answers

In the context of secure communication protocols, what do true cryptosystems refer to?

<p>Applications that protect confidential information effectively (C)</p> Signup and view all the answers

What is the most crucial factor in the strength of encryption applications and cryptosystems?

<p>The length of the cryptovariable or key (D)</p> Signup and view all the answers

How is the security of encrypted data in cryptosystems primarily maintained?

<p>By keeping some or all elements of the cryptovariable or key secret (A)</p> Signup and view all the answers

In terms of encryption key cracking, what is the relationship between the number of bits in a key and the operations needed for brute force attack?

<p>Exponential (A)</p> Signup and view all the answers

What does a computer need to perform to crack an encryption key using a brute force attack?

<p>$2^k$ operations (D)</p> Signup and view all the answers

Why is it essential to keep some or all elements of the cryptovariable(s) secret in a cryptosystem?

<p>To ensure the security of encrypted data (D)</p> Signup and view all the answers

What is a Template cipher used for?

<p>Hiding messages in a book or letter (C)</p> Signup and view all the answers

What is the main purpose of Hash Functions?

<p>Verifying message identity and integrity (A)</p> Signup and view all the answers

What distinguishes symmetric encryption from asymmetric encryption?

<p>The types of keys used (D)</p> Signup and view all the answers

In symmetric encryption, what happens if one copy of the secret key is compromised?

<p>An intermediate can decrypt messages without detection by sender/receiver (B)</p> Signup and view all the answers

Which cryptosystem is mentioned as an example of symmetric encryption in the text?

<p>Data Encryption Standard (DES) (C)</p> Signup and view all the answers

What is the main purpose of cryptanalysis?

<p>Breaking encryption codes (D)</p> Signup and view all the answers

Which method is used for scrambling data and involves replacing elements in the plaintext with other elements?

<p>Transposition ciphers (B)</p> Signup and view all the answers

What type of key size is often used to determine the strength of encryption applications?

<p>Symmetric key size (C)</p> Signup and view all the answers

Which cryptographic algorithms are commonly grouped into symmetric and asymmetric categories?

<p>Public-key algorithms (A)</p> Signup and view all the answers

In cryptography, what is the purpose of a public-key infrastructure (PKI)?

<p>Providing secure communication trust (D)</p> Signup and view all the answers

Which method is NOT a form of cryptography but is used to hide information during communication?

<p>Steganography (D)</p> Signup and view all the answers

What type of encrypted messages provide nonrepudiation by being independently verified?

<p>Digital signatures (D)</p> Signup and view all the answers

Which mathematical algorithms generate message digests to confirm the identity of messages?

<p>Hash functions (C)</p> Signup and view all the answers

Which encryption technique combines both symmetric and asymmetric approaches in most popular cryptosystems?

<p>Public-key infrastructure (PKI) (D)</p> Signup and view all the answers

What is the purpose of generating a message summary using hash functions in encryption?

<p>To confirm message integrity and identity (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Related Documents

5 Cryptography Whitman_Ch08.pdf

More Like This

Internet & HTTP Basics
34 questions

Internet & HTTP Basics

EasygoingDialect5934 avatar
EasygoingDialect5934
Use Quizgecko on...
Browser
Browser