Crypto Flashcards

1
Q

Name five services that cryptosystems can provide:

A
1 Confidentiality
2 Integrity
3 Authentication
4 Authorization (Upon proving identity, the individual is provided with a key or password that will allow access to some other resource.)
5 Nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The method of embedding a message into some types of media (stenography) is to use the LSB. What does LSB stand for?

A

Least-significant bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are examples of asymmetric algorithms? (You can choose more than one.)

A. DES
B. RC4
C. ECC
D. Diffie-Hellman

A

C and D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following are examples of symmetric algorithms? (You can choose more than one.)

A. El Gamal
B. RC4
C. SHA
D. DSA

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Buddy system for memorizing Asymmetric algorithms.

A

RSA and DSA
ECC and El Gamal
DH (Diffie Helman) and Knapsack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of cryptography does SSL/TLS use for data encryption?

A. Symmetric
B. Asymmetric
C. Neither
D. Diffie-Helman

A

A

Asymmetric is used to exchange keys. Symmetric is used to encrypt the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This algorithm uses factorization with prime numbers, (called the trapdoor function), and is currently the standard for digital signatures. It can also be used for Key distribution and encryption.

A. Diffie-Helman
B. RSA
C. DSA
D. El Gamal

A

RSA

DSA can only be used for digital signing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This block cipher mode of operation is FAST but usable only for the encryption of very short messages b/c the encrypting identical plaintext with the same key will produce identical ciphertext.

A. Cipher Block Chaining (CBC) mode
B. Output Feedback (OFB) mode
C. Counter Mode (CTR)
D. Electronic Code Book (ECB) mode

A

Electronic Code Book (ECB) mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This block cipher mode of operation does not reveal a pattern because each block of text, the key, and the value based on the previous block are processed in the algorithm and applied to the next block of text, resulting in more random ciphertext. The first block is encrypted with an initialization vector (IV).

A. Cipher Block Chaining (CBC) mode
B. Output Feedback (OFB) mode
C. Counter Mode (CTR)
D. Cipher Feedback (CFB) mode

A

Cipher Block Chaining (CBC) mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This block cipher mode of operation emulates a stream cipher which is useful for encrypting small (think 8-bit key commands) over a remote connection to a server.

A. Cipher Block Chaining (CBC) mode
B. Cipher Feedback (CFB) mode
C. Counter Mode (CTR)
D. Electronic Code Book (ECB) mode

A

Cipher Feedback (CFB) mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This block cipher mode of operation is like Cipher Feedback mode but ensures possible errors don’t affect encryption and decryption processes. Good for transmission sensitive to errors like digitized video or digitized voice.

A. Counter Mode (CTR)
B. Cipher Feedback (CFB) mode
C. Output Feedback (OFB) mode
D. Cipher Block Chaining (CBC) mode

A

Output Feedback (OFB) mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This block cipher mode of operation uses and IV counter tha increments for each plaintext block that needs to be encrypted. There is no chaining involved and is used in encrypting ATM cells for virtual circuits, in IPSec, and in the wireless security standard IEEE 802.11i

A. Counter Mode (CTR)
B. Cipher Feedback (CFB) mode
C. Output Feedback (OFB) mode
D. Cipher Block Chaining (CBC) mode

A

Counter Mode (CTR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This symmetric algorithm is uses 48 rounds in its computation, making it resistant to differential cryptanalysis, but it takes a heavy performance hit as a result.

A. Blowfish
B. AES
C. RC6
D. 3DES

A

3DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

All but one of the following can provide integrity and data origin authentication. Which one can not?

A. Hash
B. HMAC
C. CBC-MAC
D. CMAC

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following can ensure that a message has not been changed intentionally?

A. One-Way hash
B. HMAC
C. Message Integrity
D. MD4

A

HMAC

A generic one-way hash protects against UNINTENTIONAL errors that change the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does HMAC stand for?

A

Hash Message Authentication Code

17
Q

CBC-MAC is not as secure mathematically as CMAC. Both provide system authentication aka this ___________, not user authentication.

A

Data origin authentication