• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/14

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

14 Cards in this Set

  • Front
  • Back
A cryptographic algorithm is also known as:
A Cipher
A primary goal of the TLS protocol is to provide:
Privacy and Data Integrity between two communicating applications
y2 = x3 + ax + b
represents the
Elliptic Curve Discrete Logarithm problem (El Gamal)
A message of <2(64) bits is input to SHA, which produces a message digest of 160 bits, which is then fed to DSA. This describes what standard?
DSS from NIST. The Digital Signature Standard.
An attack on a hash that attempts to find a collision based on the probability that two different messages using the same hash function will produce the same message digest.
Birthday attack
Minimum 3 pieces of information required on a digital certificate is
Name
Public Key
Digital Signature of the Certifier
The sequence for decrypting transmissions on the Clipper chip is:
1. Use family key to decrypt the LEAF, recover U
2. Obtain court order for two halves of Ku, obtain Ku
3. Use Ku to Recover session key
4. Decrypt message with session key
What is another Key Escrow approach (or standard) besides Clipper?
Capstone
An algorithm that operates on a fixed length block of plaintext and breaks it into fixed length blocks of ciphertext is called:
Block Cipher
What is the term for a set of subkeys derived from a secret key
Key Schedule
TLS is based on what protocol?
SSL 3.0
TLS supports C I A above which OSI layer?
Transport Layer
AES (Rijndael) Encryption block size is 128 bits and key sizes are:
128, 192, 256 bits
The algorithm used to secure Wireless communications in 802.11 standards is called:
WEP (Wired Equivalent Privacy) it's a Secret key algorithm (symmetric)