每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A.

Slides:



Advertisements
Similar presentations
Public Key Infrastructure and Applications
Advertisements

Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
Cryptography Chapter 7 Part 4 Pages 833 to 874. PKI Public Key Infrastructure Framework for Public Key Cryptography and for Secret key exchange.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Crytography Chapter 8.
1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP.
Web Security CS-431. HTTP Authentication Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password.
Introduction to Cryptography
Network Security Chapter 8. Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental Cryptographic.
Principles of Information Security, 2nd edition1 Cryptography.
Web Security for Network and System Administrators1 Chapter 4 Encryption.
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Apr 22, 2003Mårten Trolin1 Agenda Course high-lights – Symmetric and asymmetric cryptography – Digital signatures and MACs – Certificates – Protocols Interactive.
Symmetric Key Distribution Protocol with Hybrid Crypto Systems Tony Nguyen.
Cryptographic Technologies
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
How cryptography is used to secure web services Josh Benaloh Cryptographer Microsoft Research.
Chapter Extension 23 SSL/TLS and //https © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Computer and Network Security Risanuri Hidayat, Ir., M.Sc.
Cryptography April 20, 2010 MIS 4600 – MBA © Abdou Illia.
Chapter 8 Network Security 4/17/2017
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
 2001 Prentice Hall, Inc. All rights reserved. Chapter 7 – Computer and Network Security Outline 7.1Introduction 7.2Ancient Ciphers to Modern Cryptosystems.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
1 Chapter 4 Encryption. 2 Objectives In this chapter, you will: Learn the basics of encryption technology Recognize popular symmetric encryption algorithms.
CSCI 6962: Server-side Design and Programming
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Security. Cryptography Why Cryptography Symmetric Encryption – Key exchange Public-Key Cryptography – Key exchange – Certification.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
.Net Security and Performance -has security slowed down the application By Krishnan Ganesh Madras.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
每时每刻 可信安全 1The two most common implementations of Intrusion Detection are which of the following? A Netware-based and Host-based. B Network-based and Guest-based.
Network Security. Cryptography Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message digest (e.g., MD5) Security services Privacy:
Linux Networking and Security Chapter 8 Making Data Secure.
Crypto Bro Rigby. History
Cryptography  Why Cryptography  Symmetric Encryption  Key exchange  Public-Key Cryptography  Key exchange  Certification.
Cryptography, Authentication and Digital Signatures
SECURITY Chapter 7.3 – 7.5 Presentation by Deepthi Reddy.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Chapter 21 Distributed System Security Copyright © 2008.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
1 Securing Data and Communication. 2 Module - Securing Data and Communication ♦ Overview Data and communication over public networks like Internet can.
Cryptography (2) University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Public Key Encryption.
X.509 Topics PGP S/MIME Kerberos. Directory Authentication Framework X.509 is part of the ISO X.500 directory standard. used by S/MIME, SSL, IPSec, and.
Network Security Chapter 8 12/13/ Cryptography Introduction to Cryptography Substitution Ciphers Transposition Ciphers One-Time Pads Two Fundamental.
By Sandeep Gadi 12/20/  Design choices for securing a system affect performance, scalability and usability. There is usually a tradeoff between.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
Network Security Chapter 8 Institute of Information Science and Technology. Chengdu University YiYong 2008 年 2 月 25 日.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Cryptography Why Cryptography Symmetric Encryption
Computer Communication & Networks
Chapter 8 Network Security.
Chapter 8 Network Security.
The Secure Sockets Layer (SSL) Protocol
10/7/2019 Created by Omeed Mustafa 1 st Semester M.Sc (Computer Science department) Cyber-Security.
Presentation transcript:

每时每刻 可信安全 1The DES algorithm is an example of what type of cryptography? A Secret Key B Two-key C Asymmetric Key D Public Key A

每时每刻 可信安全 2 Which type of attack is based on the probability of two different messages using the same hash function producing a common message digest? A Differential cryptanalysis B Differential linear cryptanalysis C Birthday attack D Statistical attack C

每时每刻 可信安全 3 Which of the following is not a weakness of symmetric cryptography? A Limited security B Key distribution C Speed D Scalability C

每时每刻 可信安全 4 Which of the following services is not provided by the digital signature standard (DSS)? A Encryption B Integrity C Digital signature D Authentication A

每时每刻 可信安全 5 In a hierarchical PKI the highest CA is regularly called Root CA, it is also referred to by which one of the following term? A Subordinate CA B Top CA C Big CA D Master CA B

每时每刻 可信安全 6 Which of the following statements pertaining to Secure Sockets Layer (SSL) is false? A The SSL protocol was developed by Netscape to secure Internet client-server transactions. B The SSL protocol's primary use is to authenticate the client to the server using public key cryptography and digital certificates. C Web pages using the SSL protocol start with HTTPS. D SSL can be used with applications such as Telnet, FTP and protocols. B

每时每刻 可信安全 7 Public Key Infrastructure (PKI) is the use of asymmetric key encryption between parties in which the originator encrypts information using the intended recipient's "public" key. The recipients use their own "private" key to decrypt the information. The "Infrastructure" of this methodology assumes that: A The sender and recipient have reached a mutual agreement on the encryption key exchange that they will use. B The channels through which the information flows are secure. C The recipient's identity can be positively assured to the sender. D The sender of the message is the only other person with access to the recipient's private key. C

每时每刻 可信安全 8 What attribute is included in a X.509-certificate? A Distinguished name of the subject B Telephone number of the department C secret key of the issuing CA D the key pair of the certificate holder A

每时每刻 可信安全 9 Which of the following is more suitable for a hardware implementation? A Stream ciphers B Block ciphers C Cipher block chaining D Electronic code book A

每时每刻 可信安全 10 What algorithm has been selected as the AES algorithm, replacing the DES algorithm? A RC6 B Twofish C Rijndael D Blowfish C

每时每刻 可信安全 11 In what type of attack does an attacker try, from several encrypted messages, to figure out the key used in the encryption process? A Known-plaintext attack B Ciphertext-only attack C Chosen-Ciphertext attack D Known-Ciphertext attack B

每时每刻 可信安全 Which of the following can be best defined as computing techniques for inseparably embedding unobtrusive marks or labels as bits in digital data and for detecting or extracting the marks later? A Steganography B Digital watermarking C Digital enveloping D Digital signature B

每时每刻 可信安全 13 Which of the following encryption methods is unbreakable? A Symmetric ciphers B DES codebooks C One-time pads D Elliptic-curve cryptography C

每时每刻 可信安全 14 What is called a mathematical encryption operations that can not be reversed? A One-way hash B DES C Transposition D Substitution A

每时每刻 可信安全 15 Which of the following protects Kerberos against replay attacks? A Tokens B Passwords C Cryptography D Time stamps D

每时每刻 可信安全 16 What kind of Encryption technoloy VeriSIGN's SSL utilize? A Secret key B Hybrid: Symmetric and asymmetric cryptography C Public Key D Asymmetric key B

每时每刻 可信安全 17 Which of the following statements is true about data encryption as a method of protecting data? A It verifies the accuracy of the data. B It is usually easily administered. C It requires careful key management. D It makes few demands on system resources. C

每时每刻 可信安全 18 What is used to bind a document to its creation at a particular time? A Network Time Protocol (NTP) B Digital Signature C Digital Timestamp D Certification Authority (CA) C

每时每刻 可信安全 19 The Secure Hash Algorithm (SHA-1) creates: A a fixed length message digest from a fixed length input message B a variable length message digest from a variable length input message C a fixed length message digest from a variable length input message D a variable length message digest from a fixed length input message C

每时每刻 可信安全 20 Which of the following is true about Kerberos? A It utilizes public key cryptography. B It encrypts data after a ticket is granted, but passwords are exchanged in plain text. C It depends upon symmetric ciphers. D It is a second party authentication system. C

每时每刻 可信安全 21 What is the key size of the International Data Encryption Algorithm (IDEA)? A 64 bits B 128 bits C 160 bits D 192 bits B

每时每刻 可信安全 22 What is the effective key size of DES? A 56 bits B 64 bits C 128 bits D 1024 bits A

每时每刻 可信安全 23 Which of the following threats is not addressed by digital signature and token technologies? A spoofing B replay attacks C password compromise D denial-of-service D

每时每刻 可信安全 24 What enables users to validate each other's certificate when they are certified under different certification hierarchies? A Cross-certification B Multiple certificates C Redundant certification authorities D Root certification authorities A

每时每刻 可信安全 25 The RSA Algorithm uses which mathematical concept as the basis of its encryption? A Geometry B Irrational numbers C PI ( ) D Large prime numbers D