• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/20

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back

_____________ refers to every possible value for a cryptographic key.

Keyspace

_____________ is the function most commonly seen in cryptography, a "bitwise exclusive" or

XOR

When the government keeps a copy of your private key, it is called what?

Key escrow

Processing through an algorithm more than once with different keys is called what?

Multiple encryption

The basis for symmetric cryptography is the principle of a(n):

Shared secret

Making two inputs result in the exact same cryptographic hash is called a(n):

Collision attack

A simple way to hide information, the _______________ moves a letter a set number of places down the alphabet.

Shift cipher

A cipher that works by enciphering the plaintext bit by bit, instead of in blocks.

Stream cipher

What is required for symmetric encryption?

Key management

The process of attempting to break a cryptographic system is:

Cryptanalysis

If a message has a hash, how does the hash protect the message in transit?

If the message is edited, the hash will no longer match.

How is 3DES different from many other types of encryption listed here?

It uses three keys and multiple encryption and/or decryption sets.

What is the best kind of key to have?

Long and random

A good hash function is resistant to what?

Collisions

When a message is sent, no matter what its format, why do we care about its integrity?

To show that the message has not been edited in transit

What is the biggest drawback to symmetric encryption?

It requires a key to be securely shared

How is 3DES an improvement over normal DES?

It uses three keys and multiple encryption and/or decryption sets

What is AES meant to replace?

DES

What kind of encryption cannot be reversed?

Hash functions

What cipher was chosen to be the new AES standard?

Rijndael