____________ is the process of converting plaintext, which is readable text, into ciphertext.

Upgrade to remove ads

Only ₩37,125/year

  1. Science
  2. Computer Science
  3. Computer Security and Reliability

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (25)

A certificate contains a unique serial number and must follow which standard that describes the creating of a certificate?

X.509

Cryptography is the process of converting plaintext, which is readable text, into unreadable or encrypted text called which if the following?

ciphertext

Cryptosystems that have a single key that encrypts and decrypts data are using what type of algorithm?

symmetric

If a security expert decides to study the process of breaking encryption algorithms, they are performing which of the following?

cryptanalysis

In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption algorithm, but has no access to the plaintext so he or she must try to calculate the key used to encrypt the data?

ciphertext-only

In what type of attack does the attacker need access to the cryptosystem, and the ciphertext to be decrypted to yield the desired plaintext results?

chosen-ciphertext

What application is considered the original password-cracking program and is now used by many government agencies to test for password strength?

L0phtcrack

What encryption algorithm can be used for both encryption and digital signing, uses a one-way function, and is still widely used in e-commerce?

RSA

What encryption algorithm is efficient requiring few resources, and is based on complex algebra and calculations on curves?

ECC

What type of attack is being attempted when an attacker uses a password-cracking program to guess passwords by attempting every possible combination of letters?

brute force

What type of attack is being conducted when the attacker has messages in both encrypted form and decrypted forms?

known plaintext

What type of attack is being performed when an attacker intercepts the initial communications between a Web server and a Web browser while forcing a vulnerable server to insecurely renegotiate the encryption being used down to a weaker cipher?

SSL/TLS downgrade attack

What type of attack is being performed when the attacker has access to plaintext and ciphertext, and can choose which messages to encrypt?

chosen-plaintext

What type of cryptography is demonstrated by reversing the alphabet so A becomes Z, B becomes Y, and so on?

substitution cipher

What type of system converts between plaintext and ciphertext?

cryptosystem

When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing?

dictionary

Which function ensures that a sender and receiver cannot deny sending or receiving a specific message?

Nonrepudiation

Which of the following encryption standards is part of the NSA's suite B cryptographic algorithms and is validated strong enough to protect classified data?

AES-256

Which of the following is a function that takes a variable-length string or message and produces a fixed-length message digest?

hashing algorithm

Which of the following is a mathematical function or program that works with a key?

encryption algorithm

Which of the following is a range of allowable values that is used to generate an encryption key?

keyspace

Which of the following is a scripting language for Windows and Linux that performs repetitive tasks, such as password cracking?

EXPECT

Which of the following is the process of converting ciphertext back into plaintext?

decryption

Which of the following refers to verifying the sender or receiver (or both) is who they claim to be?

Authentication

Which type of symmetric algorithm operates on plaintext one bit at a time?

stream ciphers

Recommended textbook solutions

Engineering Electromagnetics

8th EditionJohn Buck, William Hayt

483 solutions

Computer Organization and Design MIPS Edition: The Hardware/Software Interface

5th EditionDavid A. Patterson, John L. Hennessy

220 solutions

Starting Out with Java: From Control Structures Through Objects

5th EditionTony Gaddis

1,102 solutions

Computer Networking: A Top-Down Approach

7th EditionJames F. Kurose, Keith Ross

478 solutions

Sets with similar terms

9.4

14 terms

gabbyalor

Chapter 14

21 terms

boiviet

Quiz 6

30 terms

thechuckster4

Sets found in the same folder

Chapter 7 - Programming for Security Professionals

24 terms

willtlee89

Ethical Hacking Exam 2

91 terms

ty_wickline

Chapter 6 - Enumeration

25 terms

willtlee89

ITEC 472 Entire Final

93 terms

DJFATWILL

Other sets by this creator

ITEC 472 Chapter 11

25 terms

DJFATWILL

ITEC 472 Chapter 10

25 terms

DJFATWILL

ITEC 480 Final (Chapter 6-10)

73 terms

DJFATWILL

ITEC 475 Final Participation

14 terms

DJFATWILL

Other Quizlet sets

Hydrogeology unit 2

60 terms

sheenedzanap

Microbiology Midterm

43 terms

Yxvng_vad

OB Test 1 pt. 1 (NURS 3330)

139 terms

Pey10feemster

funds

43 terms

mayrasoria484

Related questions

QUESTION

When selecting an LF and obtaining video data, what must be clearly visible to determine the correct location was selected and to ensure that the video image can be trusted?

3 answers

QUESTION

Pseudo-random data added to a password before hashing is called:

15 answers

QUESTION

How do you set Hadoop to use YARN?

8 answers

QUESTION

What is the extension for a Tableau Server backup file?

3 answers

Which of the following is a function that takes a variable length string or message and produces a fixed length message digest?

A one-way hash function, also known as a message digest, is a mathematical function that takes a variable-length input string and converts it into a fixed-length binary sequence that is computationally difficult to invert—that is, generate the original string from the hash.

Which function ensures that a sender and receiver Cannot deny sending or receiving a specific message?

Nonrepudiation ensures that no party can deny that it sent or received a message via encryption and/or digital signatures or approved some information. It also cannot deny the authenticity of its signature on a document.

What encryption algorithm is efficient requiring few resources?

ECC is an efficient algorithm requiring few hardware resources, so it's a perfect candidate for wireless devices and cell phones.

What happens when people steal personal?

Key Takeaways. Identity theft occurs when someone steals your personal information and credentials to commit fraud. There are various forms of identity theft, but the most common is financial.

zusammenhängende Posts

Toplist

Neuester Beitrag

Stichworte