Show
Recommended textbook solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Recommended textbook solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions
Fundamentals of Database Systems7th EditionRamez Elmasri, Shamkant B. Navathe 687 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions Upgrade to remove ads Only ₩37,125/year
Terms in this set (20)The permutation cipher simply rearranges the values within a block to create the ciphertext. (p. 459) True True You cannot combine the XOR operation with a block cipher operation. (p. 462) True
False A cryptovariable is a value representing the application of a hash algorithm on a message. (p.465) True False - This is a hash value or a message digest A brute force function is a mathematical algorithm that generates a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity. (p.465) True False - this is a hash function Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms. True True 3DES was created to offer the same strength as the DES algorithm but ran three times as fast, thus saving time. (p.469) True False The AES algorithm was the first public-key encryption algorithm to use a 256-bit key length. True False - We thought this was true but the answer key said it was false. DES uses 56 bit key When an asymmetric cryptographic process uses the sender's private key to encrypt a message, the sender's public key must be used to decrypt the message. (p.470) True True. We thought this was False. Usually, as the length of a cryptovariable increases, the number of random guesses that have to be made in order to break the code is reduced. (p.473) True False - as key length increases, the# of random guesses increases PKI systems are based on public-key cryptosystems and include digital certificates and certificate authorities. (p.476) True True __________ is the process of converting an original message into a form that is unreadable to unauthorized individuals. (p.454) Encryption Encryption
__________ is the entire range of values that can possibly be used to construct an individual key. (p454) Code Keyspace __________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown. (p.454) Code Work factor Bit stream methods commonly use algorithm functions like the exclusive OR operation (__________). (p.461) XOR XOR A __________ is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest. (p.465) signature MAC - Message Authentication Code SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm. (p.465) 48 160 Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply look up a hashed password and read out the text version. (p.466) timing matrix rainbow table __________ is the current federal information processing standard that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure. (p.469) DES AES DES uses a(n) ___________-bit block size. 32 DES uses a 64 bit block size and a 56 bit key. DES is outdated and no longer used because it can be cracked in 4 days. The __________ algorithm, developed in 1977, was the first public-key encryption algorithm published for commercial use. (p.473) DES RSA Sets with similar terms
Principle of Information Security Chapter 872 terms AlphaRoman Principle of Information Security Chapter 872 terms jamesla12 Cryptology84 terms tmh0016 CISSP CH639 terms lwilladsen Other sets by this creator01 - Motherboards, Processors, and Memory (CompTIA…62 terms EF98 00 - Assessment Test for Exam 220-1001 (CompTIA A+…41 terms EF98 AIST 4950 - Cloud Security - Exam 0650 terms EF98 Chapter 11 - Legal and Compliance Part 2 - Review…20 terms EF98 Verified questions
COMPUTER SCIENCE Write an application that prints, on separate lines, your name, your birthday, your hobbies, your favorite book, and your favorite movie. Label each piece of information in the output. Verified answer COMPUTER SCIENCE True/False: One reason to use functions is to reduce code duplication. Verified answer
COMPUTER SCIENCE Write a program that opens an output file with the filename my_name.txt, writes your name to the file, and then closes the file. Verified answer
COMPUTER SCIENCE What is 4365 - 3412 when these values represent signed 12-bit octal numbers stored in sign-magnitude format? The result should be written in octal. Show your work. Verified answer Recommended textbook solutionsInformation Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions Information Technology Project Management: Providing Measurable Organizational Value5th EditionJack T. Marchewka 346 solutions
Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions
Service Management: Operations, Strategy, and Information Technology7th EditionJames Fitzsimmons, Mona Fitzsimmons 103 solutions Other Quizlet setsCh 1813 terms mackenzie_macmahon Exam 4 - Organizational Design105 terms Baylee_Byczkowski Ch 5: The Structure and Function of Large Biologic…110 terms greatMarcus22 W9: Randomised Control Trials48 terms aimsyxx Related questionsQUESTION True or False: Diffie-Hellman key exchange uses asymmetric encryption to exchange symmetric session keys. 3 answers QUESTION True or False: Log analysis should not take into account the difference between the reading of a system clock and standard time as this impedes the reconstruction of the sequence of events during an attack or security breach. 3 answers QUESTION What is Denial of Service attack? 15 answers QUESTION Write a loop that reads positive integers from standard input, printing out those values that are greater than 100, each on a separate line, The loop terminates when it reads an integer that is not positive. 5 answers What is the process of converting an original message into a form that is unreadable to unauthorized individuals?Encryption is the process by which a readable message is converted to an unreadable form to prevent unauthorized parties from reading it. Decryption is the process of converting an encrypted message back to its original (readable) format. The original message is called the plaintext message.
Is the process of converting an original message into a form that Cannot be read by anyone except the intended receiver quizlet?Encryption is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.
Is the process of converting the ciphertext message back into plaintext so that it can be readily understand?Encryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood. A(n) key is the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message.
What is the process of hiding messages for example Hiding a message within the digital encoding of a picture or graphic so that it is almost impossible to detect?Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. The use of steganography can be combined with encryption as an extra step for hiding or protecting data.
|