Fill This Form To Receive Instant Help
Homework answers / question archive / Drew University IS MISC Quiz 3 Question 1)Asymmetric encryption addresses the key distribution problem inherent with symmetric encryption
Drew University
IS MISC
Quiz 3
Question 1)Asymmetric encryption addresses the key distribution problem inherent with symmetric encryption.
U.S. laws regulate the exportation of cryptographic systems.
Digital certificates .
Ciphers utilize single letters or short sequences of letters to perform encryption.
quickly downloaded for use to break a password that is a word or a name?
Which asymmetric algorithm, based on modular logarithms, is used to establish and exchange asymmetric keys over an insecure medium?
Which of the following statements is NOT true regarding asymmetric encryption?
Tim would like to send a confidential, encrypted message to Kellie using asymmetric cryptography. What key should Tim use to create the message?
Tim sent a confidential, encrypted message to Kellie using asymmetric cryptography. What key should Kellie use to decrypt the message?
Confidentiality maintains the secrecy of data but does not provide a way of detecting data alteration. Integrity of data is provided via hashing functions that allow for the detection of alterations of information but does not provide confidentiality because hashing does not encrypt data
Hashing is involved with digital signatures. A hashing algorithm creates a hash to .
Symmetric encryption is also called public key cryptography.
With asymmetric encryption, information is encrypted by the sender with the receiver's public key and the information is decrypted by the receiver with the private key.
What type of encryption uses the same key to encrypt and to decrypt information?
Most encryption can be broken if an attacker has the computing power, creativity, a good understanding of cryptographic algorithms, and sufficient time
A drawback to public key infrastructure (PKI) is that the two parties must have prior knowledge of one another in order to establish a relationship.
An advantage to brute-force password attacks is that they take little time to perform even as key lengths increase.
A man-in-the-middle (MitM) attack is carried out when an attacker gets between two users with the goal of intercepting and modifying packets.
In symmetric encryption, one key is used for encryption and a separate key is used for decryption.
Tim would like to send a confidential, encrypted message to Kellie using symmetric cryptography. What key should Tim use to create the message?
Cryptography provides all of the following except .
The public key infrastructure (PKI) framework exists to manage, create, store, and distribute keys and digital certificates safely and securely.
The main function or capability of certificate authorities (CAs) is to .
A one-way hash function is also known as a fingerprint.
Alice sends a message to Bob. She uses cryptography to ensure that Bob will be able to prove to another person that the message in his possession actually came from Alice. What goal of cryptography is Alice attempting to achieve?
Brian is designing an asymmetric encryption scheme that will be used by 15 people. How many
encryption keys are required to implement this system?
For both symmetric and asymmetric cryptography, data is encrypted by applying the key to an encryption algorithm.
A common problem that makes password attacks effective is that many people use complex phrases as their password.
It is important to remember some of the reasons why the attacks work. One of the common problems is the simple fact that many people use ordinary words as their password
What provides a framework through which two parties can establish a trusted relationship even if the parties have no prior knowledge of one another?
Which term refers to the process of positively identifying a party as a user, computer, or service?
Symmetric encryption algorithms are inherently faster than asymmetric algorithms.
Which term refers to the ability to ensure that a message originated from a specific party?
In symmetric encryption, the length of the key and the quality of the algorithm will determine how secure the encryption system is.
Digital signatures combine public key cryptography and hashing.
Which term refers to the ability to verify that information has not been altered and has remained in the form originally intended by the creator?
A one-way hashing function is designed to be .
Secure Shell (SSH), Transport Layer Security (TLS), and Challenge Handshake Authentication Protocol (CHAP) are .
Substitution, transposition, stream, and block are common forms of ciphers.