Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
What does Output feedback (OFB) do:
Which method of password cracking takes the most time and effort?
What best describes the shifting of each letter a fixed number of spaces to the left or right?
Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?
A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.
Which one of the following are characteristics of a hash function? (Choose two)
What does the OCSP protocol provide?
Which of the following is a substitution cipher used by ancient Hebrew scholars?
A cryptanalysis success where the attacker deduces the secret key.
In a Feistel cipher, the two halves of the block are swapped in each round. What does this provide?
The reverse process from encoding - converting the encoded message back into its plaintext format.
The most widely used digital certificate standard. First issued July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S/MIME. Contains your name, info about you, and a signature of a person who issued the certificate.
A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed
_____ uses at least two different shifts, changing the shift with different letters in the plain text.
What advantage do symmetric algorithms have over asymmetric algorithms
You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as
Which of the following is an asymmetric cipher?
John is trying to select the appropriate authentication protocol for his company. Which of the following types of authentication solutions use tickets to provide access to various resources from a central location?
Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?
A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party.
Which of the following is an asymmetric algorithm that was first publically described in 1977?
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
Which of the following is used to encrypt email and create digital signatures?
RFC 1321 describes what hash?
A linear congruential generator is an example of what?
With Electronic codebook (ECB) what happens:
A number that is used only one time, then discarded is called what?
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?
Which one of the following is a component of the PKI?
Which of the following are valid key sizes for AES (choose three)?
Which service in a PKI will vouch for the identity of an individual or company?
A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar technologies were used in the Enigma machine. Considered the forefather of modern encryption.
In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed
Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186
The concept that if one bit of data changes, the cipher text will all completely change as well.
The most common way steganography is accomplished is via which one of the following?
A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.
The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).
What is the formula m^e %n related to?
Which one of the following is an authentication method that sends the username and password in cleartext?
Which one of the following uses three different keys, all of the same size?
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?
Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?
Which of the following would be the fastest.
____________cryptography uses one key to encrypt a message and a different key to decrypt it.
You are studying classic ciphers. You have been examining the difference between single substitution and multi-substitution. Which one of the following is an example of a multi-alphabet cipher?
Encryption of the same plain text with the same key results in the same cipher text. Use of an IV that is XORed with the first block of plain text solves this problem.
Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.
Storing private keys with a third party is referred to as what?
A simple algorithm that will take the initial key and from that generate a slightly different key each round.
Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.
Which of the following statements is most true regarding binary operations and encryption?
Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.
Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.
What size block does Skipjack use?
If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?
Electromechanical rotor-based cipher used in World War II
The ATBASH cipher is best described as what type of cipher?