Chapter 08

Chapter 08 - 08 True/False Indicate whether the statement...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
08 True/False Indicate whether the statement is true or false. ____ 1. Hashing functions require the use of keys. ____ 2. When an asymmetric cryptographic process uses the sender’s private key to encrypt a message, the sender’s public key must be used to decrypt the message. ____ 3. The most common hybrid system is based on the Diffie-Hellman Key Exchange method, which is a method for exchanging private keys using public key encryption. ____ 4. Encryption is a process of hiding information and has been in use for a long time. ____ 5. Standard-HTTP (S-HTTP) is an extended version of the Hypertext Transfer Protocol that provides for the en- cryption of individual messages between a client and server across the Internet. ____ 6. SSL builds on the encoding format of the Multipurpose Internet Mail Extensions protocol by adding encryp- tion and authentication through the use of digital signatures based on public key cryptosystems. ____ 7. Secure Electronic Transactions was developed by MasterCard and VISA in 1997 to provide protection from electronic payment fraud. ____ 8. The application header protocol provides secrecy for the content of a network communication. ____ 9. The encapsulating security payload protocol provides confidentiality services for IP packets across insecure networks. ____ 10. The SHTTP security solution provides six services: authentication by digital signatures, message encryption, compression, e-mail compatibility, segmentation, and key management. ____ 11. Attackers may conduct an encrypted-plaintext attack by sending potential victims a specific text that they are sure the victims will forward on to others. ____ 12. Dictionary attacks are a collection of brute-force methods that attempt to deduce statistical relationships between the structure of the unknown key and the ciphertext that is the output of the cryptosystem. ____ 13. Once the attacker has successfully broken an encryption, he or she may launch a replay attack, which is an at- tempt to resubmit a recording of the deciphered authentication to gain entry into a secure source. ____ 14. In 1953, Giovan Batista Belaso introduced the idea of the passphrase (password) as a key for encryption. ____ 15. In 1917, Gilbert S.Vernam, an AT&T employee, invented a polyalphabetic cipher machine that used a non-re- peating random key. ____ 16. Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network decrypts the message sent to it and then reencrypts it using different keys and sends it to the next neighbor, and this process continues until the message reaches the final destination. ____ 17. The permutation cipher simply rearranges the values within a block to create the ciphertext. ____ 18.
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/09/2011 for the course COM 308 taught by Professor E.bautista during the Fall '10 term at St. Leo.

Page1 / 12

Chapter 08 - 08 True/False Indicate whether the statement...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online