• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/45

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

45 Cards in this Set

  • Front
  • Back

the iso osi refrence model is a theoretics tool for describing connections between systems the most common implementation of a layered architecture for such communication is a suite protocols known by the acronym ___________.

tcp/ip

an opponent obtains a copy of a legitimate message as it is transmitted over a network link and inserts the copy into the system, so that both the orignal and the copy are delivered.


this is an example of __________.

replay attack

even if an opponent cannot read the content of messages he may be able to deduce the likley content from observable characteristics. this technique is known as

Traffic analysis.

analysis showed that double DES does not reduce to a single stage so it is much less vulnerable than single DES to brute force attack . however it is vulnerable to a/an

meet in the middle attack.

when two different messages generate the same hash value (or the same Mac value for the same key) the result is called a __________

collision

according to the definition in class,


a threat requires an impending action by a person with hostile intent. true or false?

false

in typical usage the algorithim used to encrypt a message is known only to the encrypter and the decrypter . true or false

false

The Boolean exclusive or (xor) operator returns 1(Which is usually interpreted as tr


when both inputs to it are the same true or false ?

false.

The sender of a message creates a message authentication code (MAC) fo rit using m generation function based on AES encryption. To authenticate the message the recipient must use a MAC verification function on AES decryption .

false

A threat that does not involve some non -trivial change to a system is known as a _______ threat.

passive

Selection, design, and implementation of security mechanisms is _______ before an organizationdevelops an information security policy

pointless

For which of the following moduli are the values 2 and 7 congruent? Inother words:

2=7(mod 5)

The modular multiplication property shows that (a - Jb) mod n = e

[(a mod n) - (b mod n)]mod n nclude_H͟

Each cycle of symmetric decryption uses the inverse operations ofthose used in encryption, in the reverse order, with nb

the same key as used in encryption mb

When using symmetric cryptography, the major challenge for the users isb

sharing the key 
b

The DES algorithm is an example of a Feistel cipher.
Which of the following statements about the Feistel design is true?


The same algorithm is used for both encryption and decryptionnsb

In the simplest mode of operation for symmetric block ciphers theplaintext is encrypted with a key and ciphertext is decrypted with the samekey. This is known 1803b

as electronic codebook key ab

a message authentication code (MAC) sent with a message does not provide the service of non-repudiation because ______

they use secret keysmenb

Which of the following is the direct outcome of successful use of theprotocol named for Whitfield Diffie and Martin Hellman? (

Agreement on a data value,Decryption of a message and Encryption of a message 8C(

Which of the following information security services is/areprovided
when a recipient successfully verifies a digital signatureaccompanying a received message? >(

non repudiation ,integrity, orgin,

The discrete logarithm problem refers to the impracticality of 7(

of reversing modular exponentiation for large numbers tabs":(

Cipher Block Chaining (CBC) is the mode of operation typically used forgeneral-purpose encryption/decryption. What is the most important distinctionbetween CBC and Electronic Codebook (ECB) mode that makes CBC the appropriatechoice here ?
 tabs":(FH{"back_s+

dont know

Cipher Block Chaining (CBC) is the mode of operation typically used forgeneral-purpose encryption/decryption. What is the most important distinctionbetween CBC and Electronic Codebook (ECB) mode that makes CBC the appropriatechoice here ?
 tabs":(FH{"back_s+

dont know

SHA-1 (the revised version of the original Secure Hash Algorithm)generates a 160-bit output value from an input bit sequence that is between 0and 2 -1 bits in length.
Assuming a uniform distribution of output values theprobability of two different messages coincidentally having the same SHA-1 hashvalue is .chԛ

dont know

RSA encryption may be expressed as C= Me mod n. RSA decryption may beexpressed asmpor(

M= C^d mod n


a particular binary boolean operator return 0 (or FALSE) if its two inputs are the same, and returns I( or true) if they are different. this operator is known as

Xor

in some modes of operation for symetric block ciphers a result from one cycle is used in the following cycle. in the first cycle there is no previous value so a special data value must be shared by the encypter and the decrypter ( in addition to the shared key). this special data value is known as___________________.

dont know. !!

the strength of several asymettric cyrptographic schemes is based on the fact that is easy to calculate expotentials in a modular system, but it is impractical to reverse those calculations for large value. this is known as the __________________________ problem .

exchange destrict logrithim.

traffic (flow) analysis may allow an opponent to violate the confidentiality of an encrypted message even if he opponent is never able to decrypt the cipher text.


true or false?

true

by deffinition an asymetric encryption scheme is more then a sysmettric encryption scheme with the same key length and the same amount of computational effort.

false

the sender of a mesasge creates a message authetication code (MAC) for it using a mac generation fuction based on AES encryption. to authenticate the message the recipeint must use a MAC verfication fuction based on AES decryption.

false

A threat that if its eventuated would involve a non-trivial change to an information system is known as a/an _______ threat

active

which of the values shown below is congurent modulo 10 to the value 2? ("modulo 10" means " with respect to the modulus value 10")

12, 22

the modular property shows that (axb) mod n =

[ (a mod n) x (b mod n)] mod n

A brute force attack is against double DES was considered infeasible, but a ____ attack was considered feasible

meet-in -the middle

a good encryption alagortihim will produce cipher text that is apparentley unrelated to the plaintext to anyone who does not know the key. such ciphertext is commonly described as

psuedo-random.

public key of an enitity is commonly communicated to other entity in a data structure known as

certificate

which of the following is the direct outcome succesfull use of the protocol named for whitefield diffie and martin heelman?

dont know this one


a. agrremtn on a data value


b. assurance that a message is correct


c. decryption of a message


d. deterrence against false claims


e. encryption of a mesage.

which of the following information security services is/are provided when a recipeint succesfully verfies a digitial signature accompnaying a received message?

non repudiation , authentication of orgin ,


authentication of integrity.

electronic codebook mode is used to provide the service of confidentiality but only for every short messages with unpredictable content because.

a perticular plaintext block value always produces the same ciphertect block value.

rsa encyption may be expressed as c= m^e mod n. rsa decryption may be expressed as

m=c^d mod n

birefley explain one (1) information security service that is provided by appropriate use of a hash function . be sure to explain why appropriate usage of the hash fuction provides that information security service.

auhentication of the intergrety of a hash value directly provides authentication at the person message this will insure that the message has not been altered, by comparing H(m1)=H(M2).

user a wants to encrypt a message using a symetric encryption algortithim so that user b can decrypt it when received. user A will generate a " session key " for this encryption .


briefly explain how user will communicate the seesion key to userB over the Network it is not practical to a deliver the key person -to-person.

different hellious method can be used user a and b will agree on a psuedacode . random numbers to generate a private key that will be used to calculate a public key. they will share these public keys and get the same k value which b shared as the secret key and caluclate a k value.

user a will generate a message and a digital signature for that message and send both to user b. briefley explain which key/s will be used to generate the digital signature. to verify the digital signature , and how each user will obtain the key/s used by that user.

answer it

user a and user b exchange messages over an information system. user c is an attacker. briefley explain what userc must do to succesfully complete a man- in - the - middle attack. against the communication between user A and user B.

answwer it !!