Which of the following are commonly used examples that implement symmetric key encryption?
a. Digital signatures
b. Secure Socket Layer (SSL)
c. Blowfish
d. Data Encryption Standard or DES
e. Pretty Good Privacy
Answer: B, C & D.
Learn More :
Encryption
- What is used along with an encryption algorithm (cipher) to encode and decode data?
- When using ______ cryptography, two people decide on a mutual key in a safe or secure way in order to exchange encrypted data with one another.
- Using symmetric key encryption alone, data is vulnerable to a man-in-the-middle attack.
- The length of an encryption key is important because:
- The lowest level of attack or simplest attack for cracking an encryption key would be a dictionary attack, which is basically trying to crack a key by trial and error.
- Which of the following is an example of a brute force attack?
- Secure Sockets Layer or SSL, which uses a encryption algorithm, is the encryption technique that is used by Secure HTTP, thus enabling e-commerce.
- What is a public key?
- It is important to use reputable certificate authorities since:
- Which of the following is true?
- Which of the following is true?
- What happens when signing a document with a digital signature?
- An encryption function takes ciphertext and a key as input and returns cleartext, provided the correct key is used.
- Why must a private key not be stored with the data it has encrypted?
- The words sunny day are encrypted to produce the text wnta lia. Which of the following is considered to be the cleartext in this example?
- A(n) ______ function takes data and a secret key as input and uses the secret key to scramble/encode the data, producing ciphertext that cannot be deciphered by anyone other than the appropriate parties.
- Certificate Authorities assure involved parties that the right people are sending or receiving the correct information by:
- What is a certificate authority (CA)?
- By acting as the creators and distributors of ______, certificate authorities use public key encryption to prevent man-in-the-middle attacks.
- A simple Caesar cipher uses a shift to encrypt while the XOR cipher needs a key to encrypt.
- ___ is the technical term for the encryption algorithm used to encrypt or decrypt a piece of data.
- A hash function is:
- Which of the following statements is true?
- A cracked encryption key is a key that:
- The study of encrypting data so that confidentiality between two parties is maintained is known as: