• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/56

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

56 Cards in this Set

  • Front
  • Back
The Hashed Message Authentication Code (HMAC) __________.
encrypts the key and the message

What is the latest version of the Secure Hash Algorithm?

SHA-3

All of the following can be broken mathematically EXCEPT____________.

OTP

Elliptic Curve Diffie-Hellman (ECDH) is an example of ______________.

in-band key exchange

Which of the following key exchanges uses the same keys each time?

Diffie-Hellman (DH)

Public key systems that generate random public keys that are different for each session are called __________________.

perfect forward secrecy

What is data called that is to be encrypted by inputting it into a cryptographic algorithm?

plaintext

Which of these is NOT a basic security protection for information that cryptography can provide?

risk loss

The areas of a file in which steganography can hide data include all of the following EXCEPT_________.

in the directory structure of the file system

Proving that a user sent an email message is known as ______________.

non-repudiation

A(n) ______________ is not decrypted but is only used for comparison purposes.

digest

Which of these is NOT a characteristic of a secure has algorithm?

Collisions should be rare

Which protection is provided by hashing?

integrity

Which of these is the strongest symmetric cryptographic algorithm?

Advanced Encryption Standard

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

A digital signature can provide each of the following benefits EXCEPT _____________.

verify the receiver

Which asymmetric cryptographic algorithm is the most secure?

RSA

Which asymmetric encryption algorithm uses prime numbers?

RSA

The Trusted Platform Module (TPM) ____________.

provides cryptographic services in hardware instead of software.

Which of these has an onboard key generator and key storage facility, as well as accelerated symmetric and asymmetric encryption, and can back up sensitive material in encrypted form?

Hardware Security Module (HSM)

Advanced Encryption Standard (AES)

A symmetric cipher that was approved by the NISTin late 2000 as a replacement for DES.

Algorithm

Procedures based on a mathematical formula used to encrypt and decrypt the data

Asymmetric Cryptographic Algorithm

Cryptography that uses two mathematically related keys

block cipher

A cipher that manipulates an entire block of plaintext at one time

blowfish

a block cipher that operates on 64-bit blocks and can have a key length from 32 to 448 bits

ciphertext

data that has been encrypted

cleartext

unencrypted data

cryptography

the science of transforming information into a secure for so that unauthorized persons cannot access it

Data encryption standard

A symmetric block cipher that uses a 65-bit key and encrypts data in 64-bit blocks

decryption

the process of changing cyphertext into plaintext

Diffie-Hellman

A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created

Diffie-Hellman Ephemeral

A diffie-hellman key exchange that uses different keys

Digest

The unique digital fingerprint created by a one-way hash algorithm

Digital Signature

An electronic verification of the sender

Elliptic Curve Diffie-Hellman

A diffie-hellman key exchange that uses elliptic curve cryptography instead of prime numbers in its computation

Encryption

The process of changing plaintext into ciphertext

Ephemeral Key

A temporar key that is used only once before it is discarded

GNU Privacy Guard

Free and open sourced software that is commonly used to encrypt and decrypt data

Hardware Security Module (HSM)

A secure cryptographic processor

Hash

An algorithm that creates a unique digital fingerprint

Hated Message Authentication Code (HMAC)

A hash function that is applied to both the key and the message

in-band

Exchanging secure information within normal communication channels

Key

A mathematical value entered into a cryptographic algorithm to produce encrypted data

Key Exchange

The process of sending and receiving secure cryptographic keys

Message Digest (MD)

A common hash algorithm with several different versions

Message Digest 5 (MD5)

the current version of MD

Non-Repudiation

The process of proving that a user performed an action

One-Time pad (OTP)

Combining plaintext with a random key to create cipher text that cannot be broken mathematically

out-of-band

Exchanging secure information outside the normal communication channels

Perfect Forward Secrecy

Public key systems that generate random public keys that are different for each section

plaintext

Cleartext data that is to be encrypted and decrypted by a cryptographic algorithm

Pretty Good Privacy (PGP)

A commercial product that is commonly used to encrypt files and messages

Private Key

A asymmetric encryption key that does have to be protected

Private Key cryptography

Cryptographic algorithms that use a single key to encrypt and decrypt a message

Public Key

An asymmetric encryption key that does not have to be protected

Public Key Cryptography

Cryptography that uses to mathematically related keys