Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Recommended textbook solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Recommended textbook solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (20)

The permutation cipher simply rearranges the values within a block to create the ciphertext. (p. 459)

True
False

True

You cannot combine the XOR operation with a block cipher operation. (p. 462)

True
False

False

A cryptovariable is a value representing the application of a hash algorithm on a message. (p.465)

True
False

False - This is a hash value or a message digest

A brute force function is a mathematical algorithm that generates a message summary or digest (sometimes called a fingerprint) to confirm message identity and integrity. (p.465)

True
False

False - this is a hash function

Popular cryptosystems use a hybrid combination of symmetric and asymmetric algorithms.

True
False

True

3DES was created to offer the same strength as the DES algorithm but ran three times as fast, thus saving time. (p.469)

True
False

False

The AES algorithm was the first public-key encryption algorithm to use a 256-bit key length.

True
False

False - We thought this was true but the answer key said it was false.

DES uses 56 bit key
3DES uses three 64 bit keys

When an asymmetric cryptographic process uses the sender's private key to encrypt a message, the sender's public key must be used to decrypt the message. (p.470)

True
False

True.

We thought this was False.

Usually, as the length of a cryptovariable increases, the number of random guesses that have to be made in order to break the code is reduced. (p.473)

True
False

False - as key length increases, the# of random guesses increases

PKI systems are based on public-key cryptosystems and include digital certificates and certificate authorities. (p.476)

True
False

True

__________ is the process of converting an original message into a form that is unreadable to unauthorized individuals. (p.454)

Encryption
Decryption
Cryptology
Cryptography

Encryption

__________ is the entire range of values that can possibly be used to construct an individual key. (p454)

Code
Keyspace
An algorithm
A cryptogram

Keyspace

__________ is the amount of effort (usually in hours) required to perform cryptanalysis to decode an encrypted message when the key or algorithm (or both) are unknown. (p.454)

Code
An algorithm
A key
Work factor

Work factor

Bit stream methods commonly use algorithm functions like the exclusive OR operation (__________). (p.461)

XOR
EOR
NOR
OR

XOR

A __________ is a key-dependent, one-way hash function that allows only specific recipients (symmetric key holders) to access the message digest. (p.465)

signature
MAC
fingerprint
digest

MAC - Message Authentication Code

SHA-1 produces a(n) ___________-bit message digest, which can then be used as an input to a digital signature algorithm. (p.465)

48
56
160
256

160

Using a database of precomputed hashes from sequentially calculated passwords called a(n) __________, an attacker can simply look up a hashed password and read out the text version. (p.466)

timing matrix
agile scrum
rainbow table
smurf list

rainbow table

__________ is the current federal information processing standard that specifies a cryptographic algorithm used within the U.S. government to protect information in federal agencies that are not a part of the national defense infrastructure. (p.469)

DES
2DES
AES
3DES

AES

DES uses a(n) ___________-bit block size.

32
64
128
256

DES uses a 64 bit block size and a 56 bit key. DES is outdated and no longer used because it can be cracked in 4 days.

The __________ algorithm, developed in 1977, was the first public-key encryption algorithm published for commercial use. (p.473)

DES
RSA
MAC
AES

RSA

Sets with similar terms

Principle of Information Security Chapter 8

72 terms

AlphaRoman

Principle of Information Security Chapter 8

72 terms

jamesla12

Cryptology

84 terms

tmh0016

CISSP CH6

39 terms

lwilladsen

Other sets by this creator

01 - Motherboards, Processors, and Memory (CompTIA…

62 terms

EF98

00 - Assessment Test for Exam 220-1001 (CompTIA A+…

41 terms

EF98

AIST 4950 - Cloud Security - Exam 06

50 terms

EF98

Chapter 11 - Legal and Compliance Part 2 - Review…

20 terms

EF98

Verified questions

COMPUTER SCIENCE

Write an application that prints, on separate lines, your name, your birthday, your hobbies, your favorite book, and your favorite movie. Label each piece of information in the output.

Verified answer

COMPUTER SCIENCE

True/False: One reason to use functions is to reduce code duplication.

Verified answer

COMPUTER SCIENCE

Write a program that opens an output file with the filename my_name.txt, writes your name to the file, and then closes the file.

Verified answer

COMPUTER SCIENCE

What is 4365 - 3412 when these values represent signed 12-bit octal numbers stored in sign-magnitude format? The result should be written in octal. Show your work.

Verified answer

Recommended textbook solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Introduction to Algorithms

3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

720 solutions

Is the process of converting an original message into a form that is unreadable to unauthorized individuals quizlet?

Service Management: Operations, Strategy, and Information Technology

7th EditionJames Fitzsimmons, Mona Fitzsimmons

103 solutions

Other Quizlet sets

Ch 18

13 terms

mackenzie_macmahon

Exam 4 - Organizational Design

105 terms

Baylee_Byczkowski

Ch 5: The Structure and Function of Large Biologic…

110 terms

greatMarcus22

W9: Randomised Control Trials

48 terms

aimsyxx

Related questions

QUESTION

True or False: Diffie-Hellman key exchange uses asymmetric encryption to exchange symmetric session keys.

3 answers

QUESTION

True or False: Log analysis should not take into account the difference between the reading of a system clock and standard time as this impedes the reconstruction of the sequence of events during an attack or security breach.

3 answers

QUESTION

What is Denial of Service attack?

15 answers

QUESTION

Write a loop that reads positive integers from standard input, printing out those values that are greater than 100, each on a separate line, The loop terminates when it reads an integer that is not positive.

5 answers

What is the process of converting an original message into a form that is unreadable to unauthorized individuals?

Encryption is the process by which a readable message is converted to an unreadable form to prevent unauthorized parties from reading it. Decryption is the process of converting an encrypted message back to its original (readable) format. The original message is called the plaintext message.

Is the process of converting an original message into a form that Cannot be read by anyone except the intended receiver quizlet?

Encryption is the process of converting an original message into a form that cannot be read by anyone except the intended receiver.

Is the process of converting the ciphertext message back into plaintext so that it can be readily understand?

Encryption is the process of converting the ciphertext message back into plaintext so that it can be readily understood. A(n) key is the programmatic steps used to convert an unencrypted message into an encrypted sequence of bits that represent the message.

What is the process of hiding messages for example Hiding a message within the digital encoding of a picture or graphic so that it is almost impossible to detect?

Steganography is the technique of hiding secret data within an ordinary, non-secret, file or message in order to avoid detection; the secret data is then extracted at its destination. The use of steganography can be combined with encryption as an extra step for hiding or protecting data.