What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature quizlet?

Home

Subjects

Expert solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (20)

Alice and Bob would like to communicate with each other using a session key but they do not already have a shared secret key. Which algorithm can they use to exchange a secret key?

Diffie-Hellman

Alice would like to send a message to Bob securely and wishes to encrypt the contents of the message. What key does she use to encrypt this message?

Bob's public key

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature?

Hash

What mathematical problem forms the basis of most modern cryptographic algorithms?

Factoring large primes

Which type of cipher works by rearranging the characters in a message?

Transposition

Which information security objective allows trusted entities to endorse information?

Certification

What standard is NOT secure and should never be used on modern wireless networks?

Wired Equivalent Privacy (WEP)

Bob received a message from Alice that contains a digital signature. What cryptographic key does Bob use to verify the digital signature?

Alice's public key

Betty receives a ciphertext message from her colleague Tim. What type of function does Betty need to use to read the plaintext message?

Decryption

What is NOT an effective key distribution method for plaintext encryption keys?

Unencrypted email

What is NOT a symmetric encryption algorithm?

? RSA, marked wrong

When Patricia receives a message from Gary, she wants to be able to demonstrate to Sue that the message actually came from Gary. What goal of cryptography is Patricia attempting to achieve?

Nonrepudiation

What is the only unbreakable cipher when it is used properly?

Vernam

Which cryptographic attack offers cryptanalysts the most information about how an encryption algorithm works?

Chosen plaintext

Which set of characteristics describes the Caesar cipher accurately?

Symmetric, stream, substitution

Which approach to cryptography provides the strongest theoretical protection?

Quantum Cryptography

What is NOT a valid encryption key length for use with the Blowfish algorithm?

512 bits

Alice would like to send a message to Bob using a digital signature. What cryptographic key does Alice use to create the digital signature?

Alice's private key

Gary is sending a message to Patricia. He wants to ensure that nobody tampers with the message while it is in transit. What goal of cryptography is Gary attempting to achieve?

Integrity

Which of the following allows a certificate authority (CA) to revoke a compromised digital certificate in real time?

Online Certificate Status Protocol (OCSP)

Students also viewed

Lab 8 Assessment Quiz

40 terms

mbarrow4PLUS

Fundamental Information Security Chapter 9: Crypto…

30 terms

grayson_bullock6

Chapter 10 Quiz

39 terms

mbarrow4PLUS

Quiz 9 Information Security Fundamentals

32 terms

DRx_

Sets found in the same folder

Chapter 10 Quiz

39 terms

mbarrow4PLUS

Quiz 9 Information Security Fundamentals

32 terms

DRx_

Chapter 11 Quiz

40 terms

mbarrow4PLUS

Lab 8 Assessment Quiz

40 terms

mbarrow4PLUS

Other sets by this creator

CNT4155 module 6

13 terms

Daniel_Bauza

CNT4155 module 5

20 terms

Daniel_Bauza

iot sec 5s

50 terms

Daniel_Bauza

iot sec 4a

45 terms

Daniel_Bauza

Verified questions

computer science

Assuming that a Random object called generator has been created, what is the range of the result of each of the following expressions? a. generator.nextInt(20), b. generator.nextlnt(8)+1, c. generator.nextlnt(45)+10, d. generator.nextlnt(100)-50.

Verified answer

computer science

How can we modify almost any algorithm to have a good best-case running time?

Verified answer

computer science

A file of 4,096 blocks is to be sorted with an available buffer space of 64 blocks. How many passes will be needed in the merge phase of the external sort-merge algorithm?

Verified answer

computer science

Which of the following is not a part of the IPO pattern? a) Input b) Program c) Process d) Output

Verified answer

Recommended textbook solutions

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature quizlet?

Information Technology Project Management: Providing Measurable Organizational Value

5th EditionJack T. Marchewka

346 solutions

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature quizlet?

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature quizlet?

Fundamentals of Database Systems

7th EditionRamez Elmasri, Shamkant B. Navathe

687 solutions

Other Quizlet sets

AIS final MC

35 terms

Chad_Kort

GEOG 1200 Final

114 terms

julianne__mae

Economics Final Exam

89 terms

amazingandrew1568

Test 5 - Week 1 combined set

67 terms

Julius_Pallotta

What type of function generates the unique value that corresponds to the contents of a message?

What type of function generates the unique value that corresponds to the contents of a message and is used to create a digital signature? Explanation: Hash functions create a unique, fixed-length output for any given input. This hash value, also known as a message digest, is used to create a digital signature.

What type of cipher replaces bits characters or blocks of information with other bits characters or blocks?

Substitution ciphers. Replace bits, characters, or character blocks in plaintext with alternate bits, characters or character blocks to produce ciphertext. A substitution cipher may be monoalphabetic or polyalphabetic: A single alphabet is used to encrypt the entire plaintext message.

Which algorithm can they use to exchange a secret key?

The Diffie-Hellman algorithm will be used to establish a secure communication channel. This channel is used by the systems to exchange a private key. This private key is then used to do symmetric encryption between the two systems.

What standard is not secure and should never be used on modern wireless networks quizlet?

What standard is NOT secure and should never be used on modern wireless networks? The Diffie-Hellman (DHE) algorithm is the basis for several common key exchange protocols, including Diffie-Hellman in Ephemeral mode (DHE) and Elliptic Curve DHE (ECDHE).