• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/13

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

13 Cards in this Set

  • Front
  • Back

Invisible ink placed on a document is an example of...

Steganography

Protocol suite created by Philip Zimmerman to handle day-to-day encryption tasks using a combination of symmetric and asymmetric encryption protocols.

PGP

A type of math problem that is difficult unless you know a specific value.

Trapdoor function

Keeping a copy of an encryption key with a trusted third party.

Key escrow

The control of user activities associated with a digital object via technological means.

Digital rights management

Alice sends an e-email that she encrypts with a shared key, which only she and Bob have. Upon receipt Bob decrypts the email and reads it. This application of encryption is an example of:

Confidentiality

All of the following are asymmetric encryption algorithms EXCEPT:

3DES

What is Diffie-Hellman most commonly used for?

Symmetric encryption key exchange

How does elliptical curve cryptography work?

It uses the geometry of a curve to calculate three points.

When a message sent by a user is digitally signed with a private key, the person will not be able to deny sending the message. This application of encryption is an example of:

Nonrepudiation

Alice sends Bob a message along with an MD5 hash of the message. Upon receipt, Bob runs the MD5 hashing algorithm and finds that the has matches the one sent by Alice. This application of encryption is an example of:

Integrity

What is public key cryptography a more common name for?

Asymmetric encryption

What application of encryption verifies that a document was sent by the person it says it is from?

Digital signature