In the context of a PKI, a(n) ___________ authority operates under the trusted
collaboration of the certificate authority and can be delegated day-to-day
certification functions, such as verifying information about new registrants,
generating end-user keys, revoking certificates, and validating that users
possess a valid certificate. ✔️Ans - registration
The CA periodically distributes a(n) ___________ to all users that identifies all
revoked certificates. ✔️Ans - CRL
A(n) ___________ or cryptosystem is an encryption method or process
encompassing the algorithm, key(s) or cryptovariable(s), and procedures
used to perform encryption and decryption. ✔️Ans - cipher
A ______________ is the information used in conjunction with an algorithm to
create the ciphertext from the plaintext or derive the plaintext from the
ciphertext. ✔️Ans - key
_____________ is the process of converting an original message into a form
that is unreadable to unauthorized individuals. ✔️Ans - Encryption
The process of obtaining the plaintext message from a ciphertext message
without knowing the keys used to perform the encryption is called
______________. ✔️Ans - cryptanalysis
A method of encryption that requires the same secret key to encipher and
decipher the message is known as ___________ encryption. ✔️Ans -
symmetric
_____________ is the entire range of values that can possibly be used to
construct an individual key. ✔️Ans - Keyspace
The ________________ cipher simply rearranges the values within a block to
create the ciphertext. ✔️Ans - transposition/permutation
, What is Diffe-Hellman most commonly used for? ✔️Ans - Symmetric
encryption key exchange
What element in the CIA triad ensures that the data sent is the same data
received? ✔️Ans - Integrity
An X.509 v3 certificate binds a __________, which uniquely identifies a
certificate entity, to a user's public key. ✔️Ans - distinguished name
How many keys exist in a public/private key pair? ✔️Ans - 2
The Secure _____________ Standard issued by the National Institute of
Standards and Technology specifies secure algorithms, such as SHA-1, for
computing a condensed representation of a message or data file. ✔️Ans -
Hash
The ___________ algorithm, developed in 1977, was the first public-key
encryption algorithm published for commercial use. ✔️Ans - RSA
At the World Championships in Athletics in Helsinki in August 2005, a virus
called Cabir infected dozens of ____________, the first time this occurred in a
public setting. ✔️Ans - Bluetooth mobile phones
Netscape developed the ____________________ Layer protocol to use public key
encryption to secure a channel over the public Internet, thus enabling
secure communications. ✔️Ans - Secure Socket
Digital ____________________ are encrypted messages that can be
mathematically proven to be authentic. ✔️Ans - signatures
The successor to 3DES is the ____________________ Encryption Standard.
✔️Ans - Advanced
_________________ is a protocol that can be used to secure communications
across any IP-based network such as LANs, WANs, and the Internet.
✔️Ans - IPSec
_____________ was developed by Phil Zimmerman and uses the IDEA cipher
for message encoding. ✔️Ans - PGP
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Studycafe. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.