Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
56 Cards in this Set
- Front
- Back
________ is the science and art of transforming messages to make them secure and immune to attacks.
|
Cryptography
|
|
The ________is the original message before transformation.
|
plaintext
|
|
The ________ is the message after transformation.
|
ciphertext
|
|
A(n) _______ algorithm transforms plaintext to ciphertext
|
encryption
|
|
A(n) ______ algorithm transforms ciphertext to plaintext.
|
decryption
|
|
A combination of an encryption algorithm and a decryption algorithm is called a ________.
|
cipher
|
|
The _______ is a number or a set of numbers on which the cipher operates.
|
key
|
|
In a(n) ________ cipher, the same key is used by both the sender and receiver.
|
symmetric-key
|
|
In a(n) ________, the key is called the secret key.
|
symmetric-key
|
|
In a(n) ________ cipher, a pair of keys is used.
|
asymmetric-key
|
|
In an asymmetric-key cipher, the sender uses the__________ key.
|
public
|
|
In an asymmetric-key cipher, the receiver uses the ______ key.
|
private
|
|
A ________ cipher replaces one character with another character.
|
substitution
|
|
_________ ciphers can be categorized into two broad categories: monoalphabetic and polyalphabetic.
|
Substitution
|
|
The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a modulus of 26.
|
shift
|
|
The Caesar cipher is a _______cipher that has a key of 3.
|
shift
|
|
The ________ cipher reorders the plaintext characters to create a ciphertext.
|
transposition
|
|
A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream.
|
S-box
|
|
A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.
|
P-box
|
|
A modern cipher is usually a complex _____cipher made of a combination of different simple ciphers.
|
round
|
|
DES is a(n) ________ method adopted by the U.S. government.
|
symmetric-key
|
|
DES has an initial and final permutation block and _________ rounds.
|
16
|
|
The DES function has _______ components.
|
4
|
|
DES uses a key generator to generate sixteen _______ round keys.
|
48-bit
|
|
Message ________ means that the sender and the receiver expect privacy.
|
confidentiality
|
|
Message_____ means that the data must arrive at the receiver exactly as sent.
|
integrity
|
|
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
|
authentication
|
|
_________ means that a sender must not be able to deny sending a message that he sent.
|
Nonrepudiation
|
|
________ means to prove the identity of the entity that tries to access the system's resources.
|
Entity authentication
|
|
A(n) _________ can be used to preserve the integrity of a document or a message.
|
message digest
|
|
A(n) ________function creates a message digest out of a message.
|
hash
|
|
A hash function must meet ________ criteria.
|
three
|
|
A _______ message digest is used as an MDC.
|
keyless
|
|
To authenticate the data origin, one needs a(n) _______.
|
MAC
|
|
A ________ signature is included in the document; a _______ signature is a separate entity.
|
conventional; digital
|
|
Digital signature provides ________.
( 2 ) |
authentication and nonrepudiation
|
|
Digital signature cannot provide ________ for the message.
|
confidentiality
|
|
If _________ is needed, a cryptosystem must be applied over the scheme.
|
confidentiality
|
|
A digital signature needs a(n)_________ system.
|
asymmetric-key
|
|
A witness used in entity authentication is ____________.
|
something known
something possessed something inherent |
|
In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.
|
entity authentication
|
|
Password-based authentication can be divided into two broad categories: _______ and _______.
|
fixed; one-time
|
|
In ________ authentication, the claimant proves that she knows a secret without actually sending it.
|
challenge-response
|
|
Challenge-response authentication can be done using ________.
|
symmetric-key ciphers
asymmetric-key ciphers keyed-hash functions |
|
A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
|
KDC
|
|
A(n)______ creates a secret key only between a member and the center.
|
KDC
|
|
The secret key between members needs to be created as a ______ key when two members contact KDC.
|
session
|
|
__________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.
|
Kerberos
|
|
Penetration Testing
|
Companies hire ethical hackers to perform penetration tests to discover vulnerabilities in a network.
Try to get into network from outside. |
|
White Box Model
|
Penetration Test Model where company discloses all information about their network during testing.
Tester may interview employees; i.e. they know the test is going on. |
|
Black Box Model
|
Penetration Test Model where tester is not given any details about network, they must find out on their own.
Employees do not know about testing. Tests if security personnel are able to detect the attack. |
|
The _______criterion ensures that we cannot find two messages that hash to the same digest.
|
strong-collision-resistance
|
|
The ________ criterion ensures that a message cannot easily be forged.
|
weak-collision-resistance
|
|
The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
|
one-wayness
|
|
A(n) ______ is a hierarchical system that answers queries about key certification.
|
CA
|
|
A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.
|
CA
|