Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
14 Cards in this Set
- Front
- Back
A cryptographic algorithm is also known as:
|
A Cipher
|
|
A primary goal of the TLS protocol is to provide:
|
Privacy and Data Integrity between two communicating applications
|
|
y2 = x3 + ax + b
represents the |
Elliptic Curve Discrete Logarithm problem (El Gamal)
|
|
A message of <2(64) bits is input to SHA, which produces a message digest of 160 bits, which is then fed to DSA. This describes what standard?
|
DSS from NIST. The Digital Signature Standard.
|
|
An attack on a hash that attempts to find a collision based on the probability that two different messages using the same hash function will produce the same message digest.
|
Birthday attack
|
|
Minimum 3 pieces of information required on a digital certificate is
|
Name
Public Key Digital Signature of the Certifier |
|
The sequence for decrypting transmissions on the Clipper chip is:
|
1. Use family key to decrypt the LEAF, recover U
2. Obtain court order for two halves of Ku, obtain Ku 3. Use Ku to Recover session key 4. Decrypt message with session key |
|
What is another Key Escrow approach (or standard) besides Clipper?
|
Capstone
|
|
An algorithm that operates on a fixed length block of plaintext and breaks it into fixed length blocks of ciphertext is called:
|
Block Cipher
|
|
What is the term for a set of subkeys derived from a secret key
|
Key Schedule
|
|
TLS is based on what protocol?
|
SSL 3.0
|
|
TLS supports C I A above which OSI layer?
|
Transport Layer
|
|
AES (Rijndael) Encryption block size is 128 bits and key sizes are:
|
128, 192, 256 bits
|
|
The algorithm used to secure Wireless communications in 802.11 standards is called:
|
WEP (Wired Equivalent Privacy) it's a Secret key algorithm (symmetric)
|