Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

14 Cards in this Set

  • Front
  • Back
A cryptographic algorithm is also known as:
A Cipher
A primary goal of the TLS protocol is to provide:
Privacy and Data Integrity between two communicating applications
y2 = x3 + ax + b
represents the
Elliptic Curve Discrete Logarithm problem (El Gamal)
A message of <2(64) bits is input to SHA, which produces a message digest of 160 bits, which is then fed to DSA. This describes what standard?
DSS from NIST. The Digital Signature Standard.
An attack on a hash that attempts to find a collision based on the probability that two different messages using the same hash function will produce the same message digest.
Birthday attack
Minimum 3 pieces of information required on a digital certificate is
Public Key
Digital Signature of the Certifier
The sequence for decrypting transmissions on the Clipper chip is:
1. Use family key to decrypt the LEAF, recover U
2. Obtain court order for two halves of Ku, obtain Ku
3. Use Ku to Recover session key
4. Decrypt message with session key
What is another Key Escrow approach (or standard) besides Clipper?
An algorithm that operates on a fixed length block of plaintext and breaks it into fixed length blocks of ciphertext is called:
Block Cipher
What is the term for a set of subkeys derived from a secret key
Key Schedule
TLS is based on what protocol?
SSL 3.0
TLS supports C I A above which OSI layer?
Transport Layer
AES (Rijndael) Encryption block size is 128 bits and key sizes are:
128, 192, 256 bits
The algorithm used to secure Wireless communications in 802.11 standards is called:
WEP (Wired Equivalent Privacy) it's a Secret key algorithm (symmetric)