Deck 3: Cryptography

Full screen (f)
exit full mode
Question
A DES key is 40 bits long.
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following statements accurately describes RC4?

A) RC4 is very slow.
B) RC4 uses a large amount of RAM.
C) RC4 can use a broad range of key lengths.
D) All of the above
Question
In codes, code symbols may represent ________.

A) complete words
B) complete phrases
C) individual letters
D) All of the above
Question
When two parties communicate with each other using symmetric key encryption, how many keys are used in total to encrypt and decrypt?

A) 1
B) 2
C) 4
D) 8
Question
________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer.

A) Cryptography
B) Encryption
C) Authentication
D) Confidentiality
Question
A DES key is ________ bits long.

A) 40
B) 56
C) 100
D) 128
Question
The best way to thwart exhaustive searches by cryptanalysts is ________.

A) to use codes
B) to make the key very long
C) randomize the key thoroughly
D) All of the above
Question
________ ciphers leave letters in their original positions.

A) Transposition
B) Substitution
C) Both A and B
D) Neither A nor B
Question
Which of the following is transmitted across a network?

A) The plaintext
B) The ciphertext
C) Both A and B
D) Neither A nor B
Question
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?

A) 7 times as long
B) 14 times as long
C) 128 times as long
D) 256 times as long
Question
Someone who breaks encryption is called a ________.

A) cracker
B) coder
C) hacker
D) cryptanalyst
Question
Nearly all encryption for confidentiality uses symmetric key encryption ciphers.
Question
________ is the security guarantee that people who intercept messages cannot read them.

A) Integrity
B) Availability
C) Confidentiality
D) Encryption
Question
A ________ is a mathematical process used in encryption and decryption.

A) key
B) cipher
C) plaintext
D) coding method
Question
In order to be considered strong today, a symmetric encryption key must be at least ________ bits long.

A) 6
B) 8
C) 100
D) 1,000
Question
Which of the following statements accurately describes RC4?

A) RC4 is extremely fast.
B) RC4 always uses a 40-bit key.
C) Both A and B
D) Neither A nor B
Question
Nearly all encryption for confidentiality uses ________ encryption ciphers.

A) public key
B) symmetric key
C) hashing
D) None of the above
Question
A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages.

A) key
B) cipher
C) plaintext
D) code
Question
________ ciphers move letters around within a message but characters are not substituted.

A) Transposition
B) Substitution
C) Both A and B
D) Neither A nor B
Question
To meet national export limitation in many countries, RC4 often uses a key length of ________ bits.

A) 8
B) 40
C) 100
D) 256
Question
In SSL/TLS, a ________ is a specific set of security methods and options.

A) cryptographic system standard
B) cipher suite
C) chosen set
D) tuple
Question
Packaged sets of cryptographic countermeasures for protecting data transmission are ________.

A) cryptographic standards
B) metacryptographic systems
C) cryptographic systems
D) All of the above
Question
Which of the following is one of the effective key lengths in 3DES?

A) 40 bits
B) 110 bits
C) Both A and B
D) Neither A nor B
Question
________ is efficient enough in processing power and RAM requirements to be used on small devices, such as PDAs and cell phones.

A) 3DES
B) AES
C) Both A and B
D) Neither A nor B
Question
The 56-bit key size ________.

A) is sufficient for major business transactions
B) is sufficient for most residential consumer applications
C) is considered a strong length
D) All of the above
Question
What protection do cryptographic systems provide on a message-by-message basis?

A) Message authentication
B) Message integrity
C) Message confidentiality
D) All of the above
Question
DES uses block encryption.
Question
In cryptographic systems, keying takes place during the second handshaking stage.
Question
Which of the following is one of the key lengths offered by AES?

A) 112 bits
B) 192 bits
C) Both A and B
D) Neither A nor B
Question
Proving your identity to a communication partner is ________.

A) validation
B) identification
C) authentication
D) certification
Question
Electronic signatures usually provide ________.

A) message-by-message authentication
B) message integrity
C) Both A and B
D) Neither A nor B
Question
When both parties prove their identities to the other, this is called ________.

A) mutual authentication
B) symmetric authentication
C) authentication
D) dual authentication
Question
________ occurs when companies believe they have good security because they are using proprietary ciphers that hackers do not know.

A) Security through obscurity
B) Weakest link ignorance
C) Reasonable protection
D) Hidden security
Question
In authentication, the party trying to provide its identity to the other party is called the applicant.
Question
What usually is the longest stage in a cryptographic system dialogue?

A) Ongoing communication
B) Negotiation of security methods and parameters
C) Keying
D) Mutual authentication
Question
Using new and proprietary encryption ciphers is a good idea because cryptanalysts will not know them.
Question
In cryptographic systems, the negotiation of security methods and options takes place during the ________ handshaking stage.

A) first
B) second
C) third
D) None of the above
Question
3DES is ________.

A) very slow
B) strong enough for communication in corporations
C) expensive in terms of processing cost
D) All of the above
Question
Someone who pretends to be someone else is ________.

A) a social engineer
B) a hacker
C) a cryptanalyst
D) an impostor
Question
Which of the following is one of the effective key lengths in 3DES?

A) 56 bits
B) 100 bits
C) 112 bits
D) None of the above
Question
In MS-CHAP, the ________ creates the response message.

A) supplicant
B) verifier
C) Both A and B
D) Neither A nor B
Question
When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message.

A) the public key
B) Joshua's public key
C) Larry's public key
D) Larry's private key
Question
MS-CHAP provides mutual authentication.
Question
Cryptanalysts have found weaknesses in ________.

A) MD5
B) SHA-512
C) Both A and B
D) Neither A nor B
Question
What is the hash size of SHA-256?

A) 112 bits
B) 128 bits
C) 160 bits
D) 256 bits
Question
The most popular public key cipher is RSA.
Question
When Carol sends a message to Bob, Bob will use ________ to decrypt the message.

A) the private key
B) Carol's private key
C) Bob's private key
D) Carol's public key
Question
Which encryption method does MS-CHAP use?

A) Symmetric key encryption
B) Public key encryption
C) Both A and B
D) Neither A nor B
Question
Public key encryption is ________.

A) complex
B) slow
C) expensive
D) All of the above
Question
________ are proofs of identity.

A) Certifications
B) Credentials
C) Cartes
D) Verifications
Question
When a hashing algorithm is applied, the hash will ALWAYS have a fixed length.
Question
The hash size in MD-5 is 160 bits.
Question
The most popular public key encryption cipher is ________.

A) AES
B) DES
C) RSA
D) ECC
Question
When Emma sends a message to Lucy, Emma will use the public key to encrypt it.
Question
The hash size in SHA-1 is 160 bits.
Question
MS-CHAP is used for ________ authentication.

A) initial
B) message-by-message
C) Both A and B
D) Neither A nor B
Question
Hashing is a reversible process.
Question
Hashing is ________.

A) reversible
B) repeatable
C) Both A and B
D) Neither A nor B
Question
To be strong, ________ keys need to be longer than ________ keys.

A) public, symmetric
B) symmetric, public
C) Public and symmetric keys of about the same length have about equal strength.
D) None of the above
Question
In mutual authentication between two parties, ________.

A) there are two verifiers and two supplicants
B) there are two verifiers, but there is only one supplicant
C) there is one verifier, but there are two supplicants
D) None of the above.
Question
In public key encryption for authentication, the supplicant uses ________ to encrypt.

A) the supplicant's private key
B) the supplicant's public key
C) the verifier's private key
D) the verifier's public key
Question
Symmetric session key exchange can be done with public key encryption.
Question
Which of the following can be used as a keying method?

A) Public key encryption for confidentiality
B) MS-CHAP
C) Both A and B
D) None of the above
Question
The supplicant creates a digital signature by ________.

A) adding the password to the challenge message and hashing the two
B) hashing the plain text message
C) encrypting the message digest with its own private key
D) encrypting the message digest with its own public key
Question
In public key encryption for authentication, the supplicant must prove that it knows ________, which nobody else should be able to know.

A) the supplicant's public key
B) the supplicant's private key
C) the true party's private key
D) the verifier's private key
Question
Strong RSA keys are at least ________ bits long.

A) 100
B) 256
C) 512
D) 1,024
Question
For message-by-message authentication, each message must contain an electronic signature.
Question
Digital signatures provide ________.

A) message authentication
B) message integrity
C) Both A and B
D) Neither A nor B
Question
To test the digital signature, the verifier will use sender's public key.
Question
An attacker who captures the keying information in Diffie-Hellman key agreement can compute the symmetric session key.
Question
In checking the digital signature, the verifier ________.

A) decrypts the digital signature it received with the supplicant's public key to get the message digest
B) hashes the plaintext message with the same algorithm used by the sender to get the message digest
C) Both A and B
D) Neither A nor B
Question
Signing a message digest means encrypting it with the sender's public key.
Question
The supplicant creates a message digest by ________.

A) adding the password to the challenge message and hashing the two
B) hashing the plaintext message
C) encrypting the message digest with its own private key
D) None of the above.
Question
In public key encryption, "signing" is the act of ________.

A) adding the password to the challenge message and hashing the two
B) hashing the plain text message
C) encrypting the message digest with its own private key
D) encrypting the message digest with its own public key
Question
Digital signatures are used for ________ authentication.

A) initial
B) message-by-message
C) Both A and B
D) Neither A nor B
Question
In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier's public key.
Question
Julia encrypts a message to David using public key encryption for confidentiality. After encrypting the message, can Julia decrypt it?
Question
Most message-by-message authentication methods provide message integrity as a by-products.
Question
The person the supplicant claims to be is the true party.
Question
In public key encryption for authentication, the verifier decrypts the ciphertext with the supplicant's public key.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/122
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Cryptography
1
A DES key is 40 bits long.
False
2
Which of the following statements accurately describes RC4?

A) RC4 is very slow.
B) RC4 uses a large amount of RAM.
C) RC4 can use a broad range of key lengths.
D) All of the above
C
3
In codes, code symbols may represent ________.

A) complete words
B) complete phrases
C) individual letters
D) All of the above
D
4
When two parties communicate with each other using symmetric key encryption, how many keys are used in total to encrypt and decrypt?

A) 1
B) 2
C) 4
D) 8
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
5
________ is the use of mathematical operations to protect messages travelling between parties or stored on a computer.

A) Cryptography
B) Encryption
C) Authentication
D) Confidentiality
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
6
A DES key is ________ bits long.

A) 40
B) 56
C) 100
D) 128
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
7
The best way to thwart exhaustive searches by cryptanalysts is ________.

A) to use codes
B) to make the key very long
C) randomize the key thoroughly
D) All of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
8
________ ciphers leave letters in their original positions.

A) Transposition
B) Substitution
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is transmitted across a network?

A) The plaintext
B) The ciphertext
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
10
If a key is 43 bits long, how much longer will it take to crack it by exhaustive search if it is extended to 50 bits?

A) 7 times as long
B) 14 times as long
C) 128 times as long
D) 256 times as long
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
11
Someone who breaks encryption is called a ________.

A) cracker
B) coder
C) hacker
D) cryptanalyst
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
12
Nearly all encryption for confidentiality uses symmetric key encryption ciphers.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
13
________ is the security guarantee that people who intercept messages cannot read them.

A) Integrity
B) Availability
C) Confidentiality
D) Encryption
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
14
A ________ is a mathematical process used in encryption and decryption.

A) key
B) cipher
C) plaintext
D) coding method
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
15
In order to be considered strong today, a symmetric encryption key must be at least ________ bits long.

A) 6
B) 8
C) 100
D) 1,000
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following statements accurately describes RC4?

A) RC4 is extremely fast.
B) RC4 always uses a 40-bit key.
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
17
Nearly all encryption for confidentiality uses ________ encryption ciphers.

A) public key
B) symmetric key
C) hashing
D) None of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
18
A ________ is a random string of 40 to 4,000 bits (ones and zeros) used to encrypt messages.

A) key
B) cipher
C) plaintext
D) code
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
19
________ ciphers move letters around within a message but characters are not substituted.

A) Transposition
B) Substitution
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
20
To meet national export limitation in many countries, RC4 often uses a key length of ________ bits.

A) 8
B) 40
C) 100
D) 256
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
21
In SSL/TLS, a ________ is a specific set of security methods and options.

A) cryptographic system standard
B) cipher suite
C) chosen set
D) tuple
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
22
Packaged sets of cryptographic countermeasures for protecting data transmission are ________.

A) cryptographic standards
B) metacryptographic systems
C) cryptographic systems
D) All of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following is one of the effective key lengths in 3DES?

A) 40 bits
B) 110 bits
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
24
________ is efficient enough in processing power and RAM requirements to be used on small devices, such as PDAs and cell phones.

A) 3DES
B) AES
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
25
The 56-bit key size ________.

A) is sufficient for major business transactions
B) is sufficient for most residential consumer applications
C) is considered a strong length
D) All of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
26
What protection do cryptographic systems provide on a message-by-message basis?

A) Message authentication
B) Message integrity
C) Message confidentiality
D) All of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
27
DES uses block encryption.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
28
In cryptographic systems, keying takes place during the second handshaking stage.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following is one of the key lengths offered by AES?

A) 112 bits
B) 192 bits
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
30
Proving your identity to a communication partner is ________.

A) validation
B) identification
C) authentication
D) certification
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
31
Electronic signatures usually provide ________.

A) message-by-message authentication
B) message integrity
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
32
When both parties prove their identities to the other, this is called ________.

A) mutual authentication
B) symmetric authentication
C) authentication
D) dual authentication
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
33
________ occurs when companies believe they have good security because they are using proprietary ciphers that hackers do not know.

A) Security through obscurity
B) Weakest link ignorance
C) Reasonable protection
D) Hidden security
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
34
In authentication, the party trying to provide its identity to the other party is called the applicant.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
35
What usually is the longest stage in a cryptographic system dialogue?

A) Ongoing communication
B) Negotiation of security methods and parameters
C) Keying
D) Mutual authentication
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
36
Using new and proprietary encryption ciphers is a good idea because cryptanalysts will not know them.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
37
In cryptographic systems, the negotiation of security methods and options takes place during the ________ handshaking stage.

A) first
B) second
C) third
D) None of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
38
3DES is ________.

A) very slow
B) strong enough for communication in corporations
C) expensive in terms of processing cost
D) All of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
39
Someone who pretends to be someone else is ________.

A) a social engineer
B) a hacker
C) a cryptanalyst
D) an impostor
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
40
Which of the following is one of the effective key lengths in 3DES?

A) 56 bits
B) 100 bits
C) 112 bits
D) None of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
41
In MS-CHAP, the ________ creates the response message.

A) supplicant
B) verifier
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
42
When Joshua sends a message to Larry, Joshua will use ________ to encrypt the message.

A) the public key
B) Joshua's public key
C) Larry's public key
D) Larry's private key
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
43
MS-CHAP provides mutual authentication.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
44
Cryptanalysts have found weaknesses in ________.

A) MD5
B) SHA-512
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
45
What is the hash size of SHA-256?

A) 112 bits
B) 128 bits
C) 160 bits
D) 256 bits
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
46
The most popular public key cipher is RSA.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
47
When Carol sends a message to Bob, Bob will use ________ to decrypt the message.

A) the private key
B) Carol's private key
C) Bob's private key
D) Carol's public key
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
48
Which encryption method does MS-CHAP use?

A) Symmetric key encryption
B) Public key encryption
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
49
Public key encryption is ________.

A) complex
B) slow
C) expensive
D) All of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
50
________ are proofs of identity.

A) Certifications
B) Credentials
C) Cartes
D) Verifications
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
51
When a hashing algorithm is applied, the hash will ALWAYS have a fixed length.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
52
The hash size in MD-5 is 160 bits.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
53
The most popular public key encryption cipher is ________.

A) AES
B) DES
C) RSA
D) ECC
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
54
When Emma sends a message to Lucy, Emma will use the public key to encrypt it.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
55
The hash size in SHA-1 is 160 bits.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
56
MS-CHAP is used for ________ authentication.

A) initial
B) message-by-message
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
57
Hashing is a reversible process.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
58
Hashing is ________.

A) reversible
B) repeatable
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
59
To be strong, ________ keys need to be longer than ________ keys.

A) public, symmetric
B) symmetric, public
C) Public and symmetric keys of about the same length have about equal strength.
D) None of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
60
In mutual authentication between two parties, ________.

A) there are two verifiers and two supplicants
B) there are two verifiers, but there is only one supplicant
C) there is one verifier, but there are two supplicants
D) None of the above.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
61
In public key encryption for authentication, the supplicant uses ________ to encrypt.

A) the supplicant's private key
B) the supplicant's public key
C) the verifier's private key
D) the verifier's public key
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
62
Symmetric session key exchange can be done with public key encryption.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
63
Which of the following can be used as a keying method?

A) Public key encryption for confidentiality
B) MS-CHAP
C) Both A and B
D) None of the above
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
64
The supplicant creates a digital signature by ________.

A) adding the password to the challenge message and hashing the two
B) hashing the plain text message
C) encrypting the message digest with its own private key
D) encrypting the message digest with its own public key
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
65
In public key encryption for authentication, the supplicant must prove that it knows ________, which nobody else should be able to know.

A) the supplicant's public key
B) the supplicant's private key
C) the true party's private key
D) the verifier's private key
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
66
Strong RSA keys are at least ________ bits long.

A) 100
B) 256
C) 512
D) 1,024
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
67
For message-by-message authentication, each message must contain an electronic signature.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
68
Digital signatures provide ________.

A) message authentication
B) message integrity
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
69
To test the digital signature, the verifier will use sender's public key.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
70
An attacker who captures the keying information in Diffie-Hellman key agreement can compute the symmetric session key.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
71
In checking the digital signature, the verifier ________.

A) decrypts the digital signature it received with the supplicant's public key to get the message digest
B) hashes the plaintext message with the same algorithm used by the sender to get the message digest
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
72
Signing a message digest means encrypting it with the sender's public key.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
73
The supplicant creates a message digest by ________.

A) adding the password to the challenge message and hashing the two
B) hashing the plaintext message
C) encrypting the message digest with its own private key
D) None of the above.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
74
In public key encryption, "signing" is the act of ________.

A) adding the password to the challenge message and hashing the two
B) hashing the plain text message
C) encrypting the message digest with its own private key
D) encrypting the message digest with its own public key
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
75
Digital signatures are used for ________ authentication.

A) initial
B) message-by-message
C) Both A and B
D) Neither A nor B
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
76
In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier's public key.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
77
Julia encrypts a message to David using public key encryption for confidentiality. After encrypting the message, can Julia decrypt it?
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
78
Most message-by-message authentication methods provide message integrity as a by-products.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
79
The person the supplicant claims to be is the true party.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
80
In public key encryption for authentication, the verifier decrypts the ciphertext with the supplicant's public key.
Unlock Deck
Unlock for access to all 122 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 122 flashcards in this deck.