100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 262 Chapter 8 Test Questions with All Correct Answers $12.99   Add to cart

Exam (elaborations)

ITN 262 Chapter 8 Test Questions with All Correct Answers

 4 views  0 purchase
  • Course
  • ITN 262
  • Institution
  • ITN 262

ITN 262 Chapter 8 Test Questions with All Correct Answers The simplest technique for key wrapping is called _____ ________. It uses xor to perform the wrapping. - Answer- key splitting. In ____ ________, the ideal KEK is not constructed from a passphrase. Both the CEK and KEK should be generat...

[Show more]

Preview 2 out of 11  pages

  • October 10, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • itn 262
  • ITN 262
  • ITN 262
avatar-seller
Scholarsstudyguide
ITN 262 Chapter 8 Test Questions
with All Correct Answers

The simplest technique for key wrapping is called _____ ________. It uses xor to
perform the wrapping. - Answer- key splitting.

In ____ ________, the ideal KEK is not constructed from a passphrase. Both the CEK
and KEK should be generated from a truly random source. - Answer- key splitting

When we wrap keys, we perform two completely separate encryptions. The first
encryption protects the data by using CEK. The second encryption protects the ____ by
using the _____. - Answer- CEK, KEK

We often have cases where we cant allow a person to act alone and take serious
action. The general solution is to break the action into steps that no single person can
take independently. This is called? - Answer- Separation of Duty

When we encrypt with a secret-key algorithm, the security resides in the key, and our
data remains secret if our key remains secret. We often call this __________________.
- Answer- secret-key cryptography.

With _____-________ _______, clever mathematics allows us to share a crypto key
publicly and still keep information safe. - Answer- public-key cryptography

PKI
When the sender uses the public key, the recipient must use the ________ _____. -
Answer- private key

PKI
we create the private key first. We derive the public key from the ______ ____. -
Answer- private key

The asymmetry in public-key cryptography allows us to produce ____ ______. -
Answer- digital signatures

Alice can use her private key to encrypt some information; the ciphertext yields the
digital signature. Anyone with Alice's _________ key can decrypt one of Alice's
signatures and verify that her personal, private key had encrypted it. - Answer- public

typical key sizes 128-256 bits. symmetric or asymmetric? - Answer- symmetric

Typical key sizes 1024-4096 bits. Symmetric or Asymmetric? - Answer- Asymmetric

, Each user may have a unique private key; only the corresponding public key works with
a given private key. - Answer- Asymmetric

All public-key algorithms rely on a mathematical trick. The algorithms use mathematical
functions that are relatively easy to calculate but very difficult to _______. - Answer-
invert

We often form the private key from one or two very large prime numbers. We form the
______ ____ by calculating a result from those prime numbers. - Answer- public key

"prime factors" ~ All integers are either prime numbers or they are composite numbers
made up of two or more primes. If we have a list of prime factors in a number (e.g.,
2,3,5, and 11), it's straightforward to multiply them together to yield 330. On the other
hand, it takes many more computational steps- and a more subtle procedure- to undo
the multiplications and retrieve the Primes. this is the basis of many ____-__
techniques. - Answer- public-key

Asymmetric algorithms fit into categories according to the __________ they use, but in
practice, we use the names of the prevailing algorithms. - Answer- mathematics

-Diffie-Hellman - products of exponents.
-Rivest-Shamir-Adleman - modular inverses
-Elliptic curves
-Others-Knapsack etc.
These are examples of what? - Answer- Asymmetric

Modern systems use public keys to wrap secret keys and to construct _______
________. - Answer- digital signatures

- Each participant multiplies their own private key by the other's public key to compute
the shared secret.
- Lets two endpoints share a single secret value without sending any secrets back and
forth.
- doesn't actually encrypt information, it provides a shared secret.
- people usually don't use for long-term public keys.
- Have at least 10 times as many bits as symmetric keys to provide comparable
resistance to trial-and-error attacks.

This is called? - Answer- Diffie-Hellman

If an attacker manages to recover one of the system's keys and that key provides no
information that helps crack future keys, then the system has ____ _____ _____.
- If two endpoints generate a new set of Diffie-Hellman key pairs to establish a new,
shared secret key, then the system has _____ _____ ________. - Answer- perfect
forward secrecy.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78252 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart