c. Min-entropy
d. Guessing entropy
Shared secret is incorrect because it is a secret used in authentication that is known to the claimant and the verifier. Min-entropy is incorrect because it is a measure of the difficulty that an attacker has to guess the most commonly chosen password used in a system. Guessing entropy is incorrect because it is a measure of the difficulty that an attacker has to guess the average password used in a system.
78. A technique to protect software from potential forgeries is to use:
a. Digital libraries
b. Digital signals
c. Digital watermarks
d. Digital signatures
Digital libraries are storage places for data and programs. Digital signals are electronic switches in computers and are represented as binary digits called bits. Digital signatures are a security authorization method to prove that a message was not modified.
79. Which of the following specifically deals with hiding messages and obscuring senders and receivers?
a. Quantum cryptography
b. Steganography
c. Cryptology
d. Cryptography
Cryptology is the science and study of writing, sending, receiving, and deciphering secret messages. It includes authentication, digital signatures, steganography, and cryptanalysis. Cryptology includes both cryptography and cryptanalysis. Cryptology is the science that deals with hidden communications. Cryptography involves the principles, means, and methods used to render information unintelligible and for restoring encrypted information to intelligible form.
80. What is an encryption algorithm that encrypts and decrypts arbitrarily sized messages called?
a. Link encryption
b. Bulk encryption
c. End-to-end encryption
d. Stream encryption
In link encryption, all information passing over the link is encrypted in its entirety. Link encryption is also called an online encryption. Simultaneous encryption of all channels of a multichannel telecommunications trunk is called a bulk encryption.
In end-to-end encryption, the information is encrypted at its origin and decrypted at its intended destination without any intermediate decryption. End-to-end encryption is also called an offline encryption. In link encryption, bulk encryption, and end-to-end encryption, the algorithm takes a fixed-length block of message (for example, 64 bits in the case of both DES and IDEA).
81. What is a message authentication code?
a. Data checksum
b. Cryptographic checksum
c. Digital signature
d. Cyclic redundancy check
A data checksum is incorrect because it catches errors that are the result of noise or other more natural or nonintentional sources. For example, most of these errors are due to human errors.