Which of the following is not one of the functions of a digital signature? |
Protect the public key |

The NTRUEncrypt cryptographic algorithm makes use of which of the following cryptographic techniques? |
lattice-based |

What cryptographic method, first proposed in the mid-1980s, makes use of sloping curves instead of large prime numbers? |
ECC |

In cryptography, which of the five basic protections ensures that the information is correct and no unauthorized person or malicious software has altered that data? |
Integrity |

On what principle did Julius Caesar’s cyptographic messages function? |
Each alphabetic letter was shifted three places down in the alphabet |

Select below the hashing algorithm that takes plaintext of any length and generates a digest 128 bits in length: |
MD2 |

What is the name of the open source asymmetric cryptography system that runs on Windows, UNIX, and Linux systems, and is compatible with PGP? |
GPG |

What type of cryptography uses two keys instead of just one, generating both a private and a public key? |
Asymmetric |

Which type of cryptographic algorithm takes an input string of any length, and returns a string of any requested variable length? |
sponge |

Cryptography that attempts to use the microscopic behaviors of objects to develop and share keys while also detecting eavesdropping is known as what type of cryptography? |
Quantum Cryptography |

What is the name of the cryptographic hash function that has international recognition and has been adopted by standards organizations such as the ISO, that creates a digest of 512 bits and will not be subject to patents? |
Whirlpool |

Data that is in an unencrypted form is referred to as which of the following? |
cleartext |

What is the block cipher algorithm that operates on 64-bit blocks and can have a key length from 32 to 448 bits known as? |
blowfish |

The asymmetric cryptography algorithm most commonly used is: |
RSA |

After the DES cipher was broken and no longer considered secure, what encryption algorithm was made as its successor? |
3DES |

The SHA-1 hashing algorithm creates a digest that is how many bits in length? |
160 bits |

Select below the standard that is based on the Rijndael algorithm, and was approved by NIST in late 2000 as a replacement for DES: |
AES |

A key that is generated by a symmetric cryptographic algorithm is said to be a: |
private key |

What type of cryptographic algorithm is considered to be a one-way algorithm, in that its contents can’t be used to reveal the original set of data? |
hash |

The simplest type of stream cipher, one in which one letter or character is exchanged for another, is known as what? |
substitution |

A symmetric cipher that was approved by the NIST in late 2000 as a replacement for DES |
AES |

An algorithm that uses elliptic curves instead of prime numbers to compute keys |
ECC |

An asymmetric encryption key that does not have to be protected. |
public key |

A symmetric block cipher that uses a 56-bit key and encrypts data in 64-bit blocks |
Data Encryption Standard (DES) |

A temporary key that is used only once before it is discarded. |
ephemeral key |

An asymmetric encryption key that does have to be protected. |
Private Key |

A cipher that manipulates an entire block of plaintext at one time. |
Block Cipher |

A key exchange that requires all parties to agree upon a large prime number and related integer so that the same key can be separately created. |
Diffie-Hellman (DH) |

An algorithm that takes one character and replaces it with one character. |
Stream Cipher |

Data that has been encrypted. |
Ciphertext |

A block cipher works on a single character at a time, and is faster than a stream cipher. |
false |

A hash algorithm is designed to create a hash that represents the contents of a set of data that can later be decrypted. |
flase |

A Hardware Security Module (HSM) is essentially a chip on the motherboard of the computer that provides cryptographic services. |
False |

Steganography hides the existence of data within images by dividing and hiding portions of a file within the image. |
True |

# SEC110_ Chapter 5 Quiz

### Share This

## Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price