• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back
________ is the science and art of transforming messages to make them secure and immune to attacks.
Cryptography
The ________is the original message before transformation.
plaintext
The ________ is the message after transformation.
ciphertext
A(n) _______ algorithm transforms plaintext to ciphertext
encryption
A(n) ______ algorithm transforms ciphertext to plaintext.
decryption
A combination of an encryption algorithm and a decryption algorithm is called a ________.
cipher
The _______ is a number or a set of numbers on which the cipher operates.
key
In a(n) ________ cipher, the same key is used by both the sender and receiver.
symmetric-key
In a(n) ________, the key is called the secret key.
symmetric-key
In a(n) ________ cipher, a pair of keys is used.
asymmetric-key
In an asymmetric-key cipher, the sender uses the__________ key.
public
In an asymmetric-key cipher, the receiver uses the ______ key.
private
A ________ cipher replaces one character with another character.
substitution
_________ ciphers can be categorized into two broad categories: monoalphabetic and polyalphabetic.
Substitution
The _______ cipher is the simplest monoalphabetic cipher. It uses modular arithmetic with a modulus of 26.
shift
The Caesar cipher is a _______cipher that has a key of 3.
shift
The ________ cipher reorders the plaintext characters to create a ciphertext.
transposition
A(n) ______ is a keyless substitution cipher with N inputs and M outputs that uses a formula to define the relationship between the input stream and the output stream.
S-box
A(n) _______is a keyless transposition cipher with N inputs and M outputs that uses a table to define the relationship between the input stream and the output stream.
P-box
A modern cipher is usually a complex _____cipher made of a combination of different simple ciphers.
round
DES is a(n) ________ method adopted by the U.S. government.
symmetric-key
DES has an initial and final permutation block and _________ rounds.
16
The DES function has _______ components.
4
DES uses a key generator to generate sixteen _______ round keys.
48-bit
Message ________ means that the sender and the receiver expect privacy.
confidentiality
Message_____ means that the data must arrive at the receiver exactly as sent.
integrity
Message _______ means that the receiver is ensured that the message is coming from the intended sender, not an imposter.
authentication
_________ means that a sender must not be able to deny sending a message that he sent.
Nonrepudiation
________ means to prove the identity of the entity that tries to access the system's resources.
Entity authentication
A(n) _________ can be used to preserve the integrity of a document or a message.
message digest
A(n) ________function creates a message digest out of a message.
hash
A hash function must meet ________ criteria.
three
A _______ message digest is used as an MDC.
keyless
To authenticate the data origin, one needs a(n) _______.
MAC
A ________ signature is included in the document; a _______ signature is a separate entity.
conventional; digital
Digital signature provides ________.
( 2 )
authentication and nonrepudiation
Digital signature cannot provide ________ for the message.
confidentiality
If _________ is needed, a cryptosystem must be applied over the scheme.
confidentiality
A digital signature needs a(n)_________ system.
asymmetric-key
A witness used in entity authentication is ____________.
something known
something possessed
something inherent
In _______, a claimant proves her identity to the verifier by using one of the three kinds of witnesses.
entity authentication
Password-based authentication can be divided into two broad categories: _______ and _______.
fixed; one-time
In ________ authentication, the claimant proves that she knows a secret without actually sending it.
challenge-response
Challenge-response authentication can be done using ________.
symmetric-key ciphers
asymmetric-key ciphers
keyed-hash functions
A(n) _____ is a trusted third party that assigns a symmetric key to two parties.
KDC
A(n)______ creates a secret key only between a member and the center.
KDC
The secret key between members needs to be created as a ______ key when two members contact KDC.
session
__________ is a popular session key creator protocol that requires an authentication server and a ticket-granting server.
Kerberos
Penetration Testing
Companies hire ethical hackers to perform penetration tests to discover vulnerabilities in a network.

Try to get into network from outside.
White Box Model
Penetration Test Model where company discloses all information about their network during testing.
Tester may interview employees; i.e. they know the test is going on.
Black Box Model
Penetration Test Model where tester is not given any details about network, they must find out on their own.
Employees do not know about testing.
Tests if security personnel are able to detect the attack.
The _______criterion ensures that we cannot find two messages that hash to the same digest.
strong-collision-resistance
The ________ criterion ensures that a message cannot easily be forged.
weak-collision-resistance
The _______ criterion states that it must be extremely difficult or impossible to create the message if the message digest is given.
one-wayness
A(n) ______ is a hierarchical system that answers queries about key certification.
CA
A(n) ________is a federal or state organization that binds a public key to an entity and issues a certificate.
CA