Bob’s password is hashed, and so is John’s. Even though they used different passwords, the hash is the same. What is this called?
What type of encryption uses different keys to encrypt and decrypt the message?
Symmetric algorithm. Designed by James Massey and Xuejia Lai. Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation.
What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?
You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as
During the process of encryption and decryption, what keys are shared?
A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.
Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.
Which one of the following is a component of the PKI?
Which of the following is not a key size used by AES?
Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.
A cryptanalysis success where the attacker deduces the secret key.
The ATBASH cipher is best described as what type of cipher?
Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
The time and effort required to break a security measure.
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
What is the largest key size that AES can use?
What does the OCSP protocol provide?
Which of the following equations is related to EC?
Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?
The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?
What is Kerchoff's principle?
Which of the following is generally true about key sizes?
What is the formula m^e %n related to?
Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?
If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?
Which of the following is a substitution cipher used by ancient Hebrew scholars?
You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Which of the following is used to encrypt email and create digital signatures?
This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.
A ______ refers to a situation where two different inputs yield the same output.
What size block does AES work on?
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.
MD5 can best be described as which one of the following?
If you use substitution alone, what weakness is present in the resulting cipher text?
Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.
A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.
Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.
Which of the following is an asymmetric cipher?
What is a TGS?
John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?
A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.
Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?
A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?
Which of the following acts as a verifier for the certificate authority?
Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
Which of the following is an asymmetric algorithm that was first publically described in 1977?
Frank is trying to break into an encrypted file… He is attempting all the possible keys that could be used for this algorithm. Attempting to crack encryption by simply trying as many randomly generated keys as possible is referred to as what?
With Cipher feedback (CFB) what happens?
Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.
Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?
Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.
What size block does Skipjack use?
Electromechanical rotor-based cipher used in World War II
Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.