EXAM
Encryption Strength is due to: - ANSWERS-- Key length
Number of bits (characters) used to convert text into blocks
256 is common
- Algorithm used (AES, RSA, etc.)
Manner in which key and text is combined to create scrambled text
- Policies concerning encryption keys
Stored securely with strong access codes
Symmetric Key Encryption - ANSWERS-system in which each pair of
trading partners uses a different key (or set of keys) for encryption to
ensure that no one else can read their message
END OF
PAGE
1
, UTK INMT 341 FINAL LATEST
EXAM
Asymmetric Public Key Encryption - ANSWERS-A cipher technique in
which different cryptographic keys are used to encrypt and decrypt a
message
Data Encryption Standard (DES) - ANSWERS-An outdated symmetric
key method of data encryption
- Works by using the same key to encrypt and decrypt a message
Advanced Encryption Standard (AES) - ANSWERS-A symmetric-key
blocked cipher algorithm and US government standard for secure and
classified data encryption and decryption
Public Key - ANSWERS-In an asymmetric cryptographic scheme, the
key that may be widely published to enable the operation of the scheme.
Private Key - ANSWERS-A mathematical key (kept secret by the
holder) used to create digital signatures and, depending on the algorithm,
to decrypt messages or files encrypted (for confidentiality) with the
corresponding public key
END OF
PAGE
2
, UTK INMT 341 FINAL LATEST
EXAM
Public Key Infrastructure (PKI) - ANSWERS-A series of processes and
technologies for the association of cryptographic keys with the entity to
whom those keys were issued
Digital Certificate - ANSWERS-An essential part of secure
communication in the public key infrastructure (used to verify the
trustworthiness of a website)
Certificate Authority - ANSWERS-A trusted third party that issues
electronic digital certificates to verify a digital entity's identity on the
internet
Digital Signature - ANSWERS-used to verify the trustworthiness of a
website, and used to verify the trustworthiness of information
- mathematical technique used to validate the authenticity and integrity
of a message, software or digital document
Hash function - ANSWERS-An algorithm that maps or translates one set
of bits into another so that a message yields the same result every time
the algorithm is executed using the same message as input
END OF
PAGE
3