Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
13 Cards in this Set
- Front
- Back
Invisible ink placed on a document is an example of... |
Steganography |
|
Protocol suite created by Philip Zimmerman to handle day-to-day encryption tasks using a combination of symmetric and asymmetric encryption protocols. |
PGP |
|
A type of math problem that is difficult unless you know a specific value. |
Trapdoor function |
|
Keeping a copy of an encryption key with a trusted third party. |
Key escrow |
|
The control of user activities associated with a digital object via technological means. |
Digital rights management |
|
Alice sends an e-email that she encrypts with a shared key, which only she and Bob have. Upon receipt Bob decrypts the email and reads it. This application of encryption is an example of: |
Confidentiality |
|
All of the following are asymmetric encryption algorithms EXCEPT: |
3DES |
|
What is Diffie-Hellman most commonly used for? |
Symmetric encryption key exchange |
|
How does elliptical curve cryptography work? |
It uses the geometry of a curve to calculate three points. |
|
When a message sent by a user is digitally signed with a private key, the person will not be able to deny sending the message. This application of encryption is an example of: |
Nonrepudiation |
|
Alice sends Bob a message along with an MD5 hash of the message. Upon receipt, Bob runs the MD5 hashing algorithm and finds that the has matches the one sent by Alice. This application of encryption is an example of: |
Integrity |
|
What is public key cryptography a more common name for? |
Asymmetric encryption |
|
What application of encryption verifies that a document was sent by the person it says it is from? |
Digital signature |