Cryptographic Algorithms Flashcards

1
Q

Your organization wants to deploy a new encryption system that will protect the majority of data with a symmetric cipher of at least 256 bits in strength. What is the best choice of cipher for large amounts of data at rest?

RC4

3DES

AES

A

AES

The most likely utilized cipher is AES. It can be run at 128-, 192-, and 256-bit strengths and is considered the gold standard of current symmetric ciphers, with no known attacks, and is computationally efficient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A colleague who is performing a rewrite of a custom application that was using 3DES encryption asks you how 3DES can be more secure than the DES it is based on. What is your response?

3DES uses a key that’s three times longer.

3DES loops through the DES algorithm three times, with different keys each time.

3DES is no more secure than DES.

A

3DES loops through the DES algorithm three times, with different keys each time.

3DES can be more secure because it loops through the DES algorithm three times, with a different key each time: encrypt with key 1, decrypt with key 2, and then encrypt with key 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What cipher mode is potentially vulnerable to a POODLE attack?

ECB

CBC

CTR

A

CBC

Cipher Block Chaining (CBC) mode is vulnerable to a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack, where the system freely responds to a request about a message’s padding being correct. Manipulation of the padding is used in the attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What cipher mode is used in the IEEE 802.1AE standard and recognized by NIST?

CTR

GCM

ECB

A

GCM

Galois Counter Mode (GCM) is recognized by NIST and is used in the 802.1AE standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Your manager wants you to spearhead the effort to implement digital signatures in the organization and to report to him what is needed for proper security of those signatures. You likely have to study which algorithm?

RC4

SHA-1

RSA

A

RSA

Digital signatures require a public key algorithm, so most likely you need to study RSA to provide the asymmetric cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hashing is most commonly used for which of the following?

Digital signatures

Secure storage of passwords for authentication

Key management

A

Secure storage of passwords for authentication

Hashing is most commonly used to securely store passwords on systems so that users can authenticate to the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A friend at work asks you to e-mail him some information about a project you have been working on, but then requests you “to hide the e-mail from the monitoring systems by encrypting it using ROT13.” What is the weakness in this strategy?

ROT13 is a very simple substitution scheme and is well understood by anyone monitoring the system, providing no security.

ROT13 is not an algorithm.

The monitoring system will not allow anything but plaintext to go through.

A

ROT13 is a very simple substitution scheme and is well understood by anyone monitoring the system, providing no security.

ROT13 is a simple substitution cipher that is very well known and will be simple for any person or system to decode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why would you use PBKDF2 as part of your encryption architecture?

To use the speed of the crypto subsystems built into modern CPUs

To increase the number of rounds a symmetric cipher has to perform

To stretch passwords into secure-length keys appropriate for encryption

A

To stretch passwords into secure-length keys appropriate for encryption

PBKDF2 is a key stretching algorithm that stretches a password into a key of suitable length by adding a salt and then performing an HMAC to the input thousands of times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why are hash collisions bad for malware prevention?

Malware could corrupt the hash algorithm.

Two different programs with the same hash could allow malware to be undetected.

The hashed passwords would be exposed.

A

Two different programs with the same hash could allow malware to be undetected.

The ability to create a program that has the same hash as a known-good program would allow malware to be undetected by detection software that uses a hash list of approved programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What has made the PGP standard popular for so long?

Its flexible use of both symmetric and asymmetric algorithms

Simple trust model

The ability to run on any platform

A

Its flexible use of both symmetric and asymmetric algorithms

Pretty Good Privacy (PGP) is a popular standard because of its use of both symmetric and asymmetric algorithms when best suited to the type of encryption being done

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a key consideration when implementing an RC4 cipher system?

Key entropy

External integrity checks

Checks for weak keys

A

Checks for weak keys

As RC4 is susceptible to weak keys, one key in 256 is considered weak and should not be utilized. Any implementation should have a check for weak keys as part of the protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why are ephemeral keys important to key exchange protocols?

They add entropy to the algorithm.

They allow the key exchange to be completed faster.

They increase security by using a different key for each connection.

A

They increase security by using a different key for each connection.

Ephemeral keys are important to key exchange protocols because they ensure that each connection has its own key for the symmetric encryption, and if an attacker compromises one key, he does not have all the traffic for this connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly