Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
56 Cards in this Set
- Front
- Back
The Hashed Message Authentication Code (HMAC) __________.
|
encrypts the key and the message
|
|
What is the latest version of the Secure Hash Algorithm? |
SHA-3 |
|
All of the following can be broken mathematically EXCEPT____________. |
OTP |
|
Elliptic Curve Diffie-Hellman (ECDH) is an example of ______________. |
in-band key exchange |
|
Which of the following key exchanges uses the same keys each time? |
Diffie-Hellman (DH) |
|
Public key systems that generate random public keys that are different for each session are called __________________. |
perfect forward secrecy |
|
What is data called that is to be encrypted by inputting it into a cryptographic algorithm? |
plaintext |
|
Which of these is NOT a basic security protection for information that cryptography can provide? |
risk loss |
|
The areas of a file in which steganography can hide data include all of the following EXCEPT_________. |
in the directory structure of the file system |
|
Proving that a user sent an email message is known as ______________. |
non-repudiation |
|
A(n) ______________ is not decrypted but is only used for comparison purposes. |
digest |
|
Which of these is NOT a characteristic of a secure has algorithm? |
Collisions should be rare |
|
Which protection is provided by hashing? |
integrity |
|
Which of these is the strongest symmetric cryptographic algorithm? |
Advanced Encryption Standard |
|
If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message? |
Alice's public key |
|
A digital signature can provide each of the following benefits EXCEPT _____________. |
verify the receiver |
|
Which asymmetric cryptographic algorithm is the most secure? |
RSA |
|
Which asymmetric encryption algorithm uses prime numbers? |
RSA |
|
The Trusted Platform Module (TPM) ____________. |
provides cryptographic services in hardware instead of software. |
|
Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form? |
Hardware Security Module (HSM) |
|
Advanced Encryption Standard (AES) |
A symmetric cipher that was approved by the NISTin late 2000 as a replacement for DES. |
|
Algorithm |
Procedures based on a mathematical formula used to encrypt and decrypt the data |
|
Asymmetric Cryptographic Algorithm |
Cryptography that uses two mathematically related keys |
|
block cipher |
A cipher that manipulates an entire block of plaintext at one time |
|
blowfish |
a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits |
|
ciphertext |
data that has been encrypted |
|
cleartext |
unencrypted data |
|
cryptography |
the science of transforming information into a secure for so that unauthorized persons cannot access it |
|
Data encryption standard |
A symmetric block cipher that uses a 65-bit key and encrypts data in 64-bit blocks |
|
decryption |
the process of changing cyphertext into plaintext |
|
Diffie-Hellman |
A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created |
|
Diffie-Hellman Ephemeral |
A diffie-hellman key exchange that uses different keys |
|
Digest |
The unique digital fingerprint created by a one-way hash algorithm |
|
Digital Signature |
An electronic verification of the sender |
|
Elliptic Curve Diffie-Hellman |
A diffie-hellman key exchange that uses elliptic curve cryptography instead of prime numbers in its computation |
|
Encryption |
The process of changing plaintext into ciphertext |
|
Ephemeral Key |
A temporar key that is used only once before it is discarded |
|
GNU Privacy Guard |
Free and open sourced software that is commonly used to encrypt and decrypt data |
|
Hardware Security Module (HSM) |
A secure cryptographic processor |
|
Hash |
An algorithm that creates a unique digital fingerprint |
|
Hated Message Authentication Code (HMAC) |
A hash function that is applied to both the key and the message |
|
in-band |
Exchanging secure information within normal communication channels |
|
Key |
A mathematical value entered into a cryptographic algorithm to produce encrypted data |
|
Key Exchange |
The process of sending and receiving secure cryptographic keys |
|
Message Digest (MD) |
A common hash algorithm with several different versions |
|
Message Digest 5 (MD5) |
the current version of MD |
|
Non-Repudiation |
The process of proving that a user performed an action |
|
One-Time pad (OTP) |
Combining plaintext with a random key to create cipher text that cannot be broken mathematically |
|
out-of-band |
Exchanging secure information outside the normal communication channels |
|
Perfect Forward Secrecy |
Public key systems that generate random public keys that are different for each section |
|
plaintext |
Cleartext data that is to be encrypted and decrypted by a cryptographic algorithm |
|
Pretty Good Privacy (PGP) |
A commercial product that is commonly used to encrypt files and messages |
|
Private Key |
A asymmetric encryption key that does have to be protected |
|
Private Key cryptography |
Cryptographic algorithms that use a single key to encrypt and decrypt a message |
|
Public Key |
An asymmetric encryption key that does not have to be protected |
|
Public Key Cryptography |
Cryptography that uses to mathematically related keys |