Cryptographic Solutions Flashcards
1.4 - Explain the importance of using appropriate cryptographic solutions 2.3 - Explain various types of vulnerabilities 2.4 - Given a scenario, you must be able to analyze indicators of malicious activity
Which of the following are true about symmetric encryption? (Choose Two)
A. Uses a single key for encryption and decryption
B. Provides non-repudiation
C. Requires a shared secret key between sender and receiver
D. Is faster than asymmetric encryption
Answer:
A. Uses a single key for encryption and decryption
C. Requires a shared secret key between sender and receiver
Explanation:
Correct Options:
A: Symmetric encryption uses the same key for both encryption and decryption.
C: Both the sender and receiver must share the same secret key, which is a challenge in large-scale usage.
Incorrect Options:
B: Symmetric encryption does not provide non-repudiation because multiple parties share the same key, making it impossible to prove who performed the encryption or decryption.
D: While symmetric encryption is faster than asymmetric encryption, this is not a defining characteristic of symmetric encryption itself.
Which of the following are examples of asymmetric encryption algorithms? (Choose Three)
A. AES
B. RSA
C. Diffie-Hellman
D. ECC (Elliptic Curve Cryptography)
Answer:
B. RSA
C. Diffie-Hellman
D. ECC (Elliptic Curve Cryptography)
Explanation:
Correct Options:
B: RSA is a widely used asymmetric encryption algorithm.
C: Diffie-Hellman is used for secure key exchange and is part of asymmetric cryptography.
D: ECC is an asymmetric encryption method that provides strong security with smaller key sizes.
Incorrect Option:
A: AES is a symmetric encryption algorithm, not asymmetric.
What is the primary advantage of using a hybrid encryption approach?
A. It eliminates the need for encryption keys
B. It combines the speed of symmetric encryption with the key distribution benefits of asymmetric encryption
C. It uses only public keys for encryption and decryption
D. It is slower but more secure than symmetric encryption
Answer:
B. It combines the speed of symmetric encryption with the key distribution benefits of asymmetric encryption
Explanation:
Correct Option:
B: A hybrid approach uses asymmetric encryption to securely share a symmetric key, which is then used for fast bulk data encryption.
Incorrect Options:
A: Encryption keys are still required in a hybrid approach.
C: A hybrid approach uses both public and private keys for key exchange, not just public keys.
D: A hybrid approach is designed to be both fast and secure, not slower.
Which of the following is a characteristic of a stream cipher?
A. Encrypts data in fixed-size blocks
B. Uses a keystream generator and XOR function for encryption
C. Is typically implemented in software
D. Is slower than block ciphers
Answer:
B. Uses a keystream generator and XOR function for encryption
Explanation:
Correct Option:
B: Stream ciphers encrypt data bit-by-bit or byte-by-byte using a keystream generator and XOR function.
Incorrect Options:
A: This describes block ciphers, not stream ciphers.
C: Stream ciphers are often implemented in hardware, not software.
D: Stream ciphers are generally faster than block ciphers, especially for real-time data streams.
What is the main challenge of symmetric encryption in large-scale usage?
A. Lack of confidentiality
B. Difficulty in distributing shared secret keys
C. Slower performance compared to asymmetric encryption
D. Inability to encrypt data in real-time
Answer:
B. Difficulty in distributing shared secret keys
Explanation:
Correct Option:
B: Symmetric encryption requires both parties to share the same secret key, which becomes challenging as the number of users increases.
Incorrect Options:
A: Symmetric encryption provides confidentiality, not a lack of it.
C: Symmetric encryption is faster than asymmetric encryption.
D: Symmetric encryption can encrypt data in real-time, especially with stream ciphers.
Which of the following are common vulnerabilities associated with symmetric encryption? (Choose Two)
A. Key distribution challenges
B. Lack of non-repudiation
C. Susceptibility to brute-force attacks
D. Slower performance compared to asymmetric encryption
Answer:
A. Key distribution challenges
B. Lack of non-repudiation
Explanation:
Correct Options:
A: Distributing shared secret keys securely is a major challenge in symmetric encryption.
B: Symmetric encryption does not provide non-repudiation because multiple parties share the same key.
Incorrect Options:
C: While brute-force attacks are a risk, they are not unique to symmetric encryption.
D: Symmetric encryption is faster than asymmetric encryption.
Which of the following could indicate malicious activity in a network using symmetric encryption? (Choose Two)
A. Unauthorized users gaining access to shared secret keys
B. Frequent changes to public keys
C. Unexpectedly high CPU usage during encryption processes
D. Use of hybrid encryption for secure communication
Answer:
A. Unauthorized users gaining access to shared secret keys
C. Unexpectedly high CPU usage during encryption processes
Explanation:
Correct Options:
A: Unauthorized access to shared secret keys is a clear indicator of malicious activity.
C: High CPU usage during encryption could indicate a brute-force attack or unauthorized encryption processes.
Incorrect Options:
B: Frequent changes to public keys are not directly related to symmetric encryption.
D: Hybrid encryption is a legitimate and secure approach, not an indicator of malicious activity.
Which of the following are true about DES (Data Encryption Standard)? (Choose Two)
A. It uses a 64-bit key with 56 effective bits due to parity.
B. It encrypts data in 128-bit blocks.
C. It was widely used from the 1970s to the early 2000s.
D. It is a stream cipher.
Answer:
A. It uses a 64-bit key with 56 effective bits due to parity.
C. It was widely used from the 1970s to the early 2000s.
Explanation:
Correct:
A: DES uses a 64-bit key, but only 56 bits are effective for encryption due to parity bits.
C: DES was widely used from the 1970s to the early 2000s before being replaced by more secure algorithms.
Incorrect Options:
B: DES encrypts data in 64-bit blocks, not 128-bit blocks.
D: DES is a block cipher, not a stream cipher.
What is the effective key strength of Triple DES (3DES)?
A. 56 bits
B. 112 bits
C. 128 bits
D. 256 bits
Answer:
B. 112 bits
Explanation:
Correct:
B: Triple DES uses three 56-bit keys, resulting in an effective key strength of 112 bits.
Incorrect Options:
A: 56 bits is the key strength of standard DES, not 3DES.
C: 128 bits is the key size for AES-128, not 3DES.
D: 256 bits is the key size for AES-256, not 3DES.
Which of the following symmetric algorithms is a stream cipher?
A. AES
B. RC4
C. Blowfish
D. Twofish
Answer:
B. RC4
Explanation:
Correct:
B: RC4 is a stream cipher, unlike the others listed, which are block ciphers.
Incorrect Options:
A: AES is a block cipher.
C: Blowfish is a block cipher.
D: Twofish is a block cipher.
Which of the following algorithms was chosen as the replacement for DES and 3DES by the US government?
A. IDEA
B. AES
C. Blowfish
D. RC6
Answer:
B. AES
Explanation:
Correct:
B: AES (Advanced Encryption Standard) was chosen by the US government as the replacement for DES and 3DES.
Incorrect Options:
A: IDEA was a contender but not chosen.
C: Blowfish was developed as a DES replacement but not widely adopted.
D: RC6 was a contender but not chosen.
Which of the following are true about AES (Advanced Encryption Standard)? (Choose Three)
A. It supports key sizes of 128, 192, and 256 bits.
B. It is also known as the Rijndael Cipher.
C. It is a stream cipher.
D. It is the encryption standard for sensitive unclassified information.
Answer:
A. It supports key sizes of 128, 192, and 256 bits.
B. It is also known as the Rijndael Cipher.
D. It is the encryption standard for sensitive unclassified information.
Explanation:
Correct:
A: AES supports key sizes of 128, 192, and 256 bits.
B: AES is also known as the Rijndael Cipher, named after its creators.
D: AES is the encryption standard for sensitive unclassified information.
Incorrect Options:
C: AES is a block cipher, not a stream cipher.
Which of the following algorithms uses a 128-bit key and is faster and more secure than DES?
A. DES
B. 3DES
C. IDEA
D. RC4
Answer:
C. IDEA
Explanation:
Correct:
C: IDEA (International Data Encryption Algorithm) uses a 128-bit key and is faster and more secure than DES.
Incorrect Options:
A: DES uses a 56-bit key and is less secure.
B: 3DES uses three 56-bit keys but is slower than DES.
D: RC4 is a stream cipher with variable key sizes, not specifically faster or more secure than DES.
Which of the following are true about Blowfish and Twofish? (Choose Two)
A. Both are block ciphers.
B. Both were developed as replacements for DES.
C. Both are patented and proprietary.
D. Both use 128-bit block sizes.
Answer:
A. Both are block ciphers.
B. Both were developed as replacements for DES.
Explanation:
Correct:
A: Blowfish and Twofish are both block ciphers.
B: Both were developed as replacements for DES.
Incorrect Options:
C: Neither Blowfish nor Twofish are patented; they are open source.
D: Blowfish uses a 64-bit block size, while Twofish uses a 128-bit block size.
Which of the following are part of the RC Cipher Suite? (Choose Three)
A. RC1
B. RC4
C. RC5
D. RC6
Answer:
B. RC4
C. RC5
D. RC6
Explanation:
Correct:
B: RC4 is a stream cipher used in SSL and WEP.
C: RC5 is a block cipher with key sizes up to 2048 bits.
D: RC6 is a stronger version of RC5 and was a contender for the DES replacement.
Incorrect Options:
A: RC1 was never published.
Which of the following is the most widely used symmetric encryption algorithm today?
A. DES
B. 3DES
C. AES
D. Blowfish
Answer:
C. AES
Explanation:
Correct:
C: AES is the most widely used symmetric encryption algorithm today and is considered the strongest.
Incorrect Options:
A: DES is outdated and insecure.
B: 3DES is slower and less efficient than AES.
D: Blowfish is not as widely adopted as AES.
Alice wants to send Bob a confidential message. She also wants to ensure that Bob can verify the message’s integrity and confirm that it was indeed sent by her. Which of the following steps should Alice follow to achieve confidentiality, non-repudiation, and integrity?
A. Encrypt the message using Bob’s public key, hash the message using SHA-256, and encrypt the hash using her private key.
B. Hash the message using SHA-256, encrypt the hash using her private key, and encrypt the message using her public key.
C. Encrypt the message using her private key, hash the message using SHA-256, and encrypt the hash using Bob’s public key.
D. Hash the message using SHA-256, encrypt the hash using Bob’s public key, and encrypt the message using her private key.
Answer:
A. Encrypt the message using Bob’s public key, hash the message using SHA-256, and encrypt the hash using her private key.
Explanation:
Correct Option:
A:
Confidentiality is ensured by encrypting the message with Bob’s public key because only Bob can decrypt it using his private key.
Integrity is achieved by hashing the message using SHA-256 to produce a unique fingerprint.
Non-repudiation is provided by encrypting the hash (digital signature) with Alice’s private key because only Alice could have signed it.
Incorrect Options:
B: Encrypting the message with Alice’s public key does not ensure confidentiality because anyone can decrypt it using Alice’s public key.
C: Encrypting the message with Alice’s private key does not ensure confidentiality because anyone can decrypt it using her public key.
D: Encrypting the hash with Bob’s public key is incorrect for non-repudiation because it does not prove that Alice signed it.
Bob receives a confidential message from Alice. The message also includes a digital signature. What steps should Bob take to verify the integrity and authenticity of the message?
A. Decrypt the message using Alice’s public key, hash the message using SHA-256, and compare it to the hash from the digital signature.
B. Decrypt the message using his private key, hash the message using SHA-256, decrypt the signature using Alice’s public key, and compare the hashes.
C. Hash the message using SHA-256, decrypt the hash using Alice’s private key, and compare the hashes.
D. Decrypt the message using his public key, decrypt the hash using Alice’s private key, and compare the hashes.
Answer:
B. Decrypt the message using his private key, hash the message using SHA-256, decrypt the signature using Alice’s public key, and compare the hashes.
Explanation:
Correct Option:
B:
Bob decrypts the message using his private key because the message was encrypted using his public key (confidentiality).
Bob hashes the decrypted message using the same hash algorithm (e.g., SHA-256).
Bob decrypts the digital signature (encrypted hash) using Alice’s public key, verifying that Alice signed it (non-repudiation).
Bob compares the two hashes. If they match, the message’s integrity and authenticity are verified.
Incorrect Options:
A: Decrypting the message with Alice’s public key is incorrect; the message was encrypted with Bob’s public key.
C: The hash from the message must be compared to the decrypted digital signature, not the other way around.
D: Decrypting the message with Bob’s public key is incorrect since the message was encrypted with Bob’s public key and requires his private key.
Alice needs to send a file to Bob. The file must remain confidential, and Bob should be able to verify that Alice was the sender and that the file was not tampered with. Which of the following describes the correct order of operations?
A. Hash the file, encrypt the file with Bob’s public key, and encrypt the hash with Alice’s private key.
B. Encrypt the file with Bob’s private key, hash the file, and encrypt the hash with Alice’s public key.
C. Encrypt the file with Bob’s public key, hash the file, and encrypt the hash with Alice’s private key.
D. Hash the file, encrypt the hash with Bob’s public key, and encrypt the file with Alice’s private key.
Answer:
C. Encrypt the file with Bob’s public key, hash the file, and encrypt the hash with Alice’s private key.
Explanation:
Correct Option:
C:
Alice encrypts the file with Bob’s public key to ensure confidentiality (only Bob can decrypt it).
Alice hashes the file to produce a unique hash for integrity.
Alice encrypts the hash (digital signature) with her private key to provide non-repudiation (proving she signed it).
Incorrect Options:
A: Hashing the file first is fine, but encrypting the file with Alice’s private key does not ensure confidentiality.
B: Encrypting the file with Bob’s private key is incorrect; it must be encrypted with his public key to ensure confidentiality.
D: Encrypting the hash with Bob’s public key is incorrect for non-repudiation, as it does not prove Alice signed it.
You are a security engineer tasked with implementing a digital signature system to verify the authenticity of messages exchanged between your company’s servers and its clients. Your team suggests the following options for signing the hash of the messages. Which three options would be appropriate for signing the hash? (Choose Two)
A. RSA
B. DSA
C. Diffie-Hellman
D. ECDSA
E. AES
Answer:
A. RSA
D. ECDSA
Explanation:
Correct Options:
RSA: RSA is a versatile algorithm that can be used for both encryption and digital signatures. It is commonly used for signing and verifying messages.
ECDSA: The Elliptic Curve Digital Signature Algorithm (ECDSA) is specifically designed for digital signing and is a more efficient alternative to RSA due to its smaller key sizes and faster computations.
Incorrect Options:
DSA: While DSA is also a valid digital signature algorithm, the question asks for two options, and RSA and ECDSA are more widely used in modern implementations.
Diffie-Hellman: Diffie-Hellman is a key exchange protocol, not a digital signature algorithm. It is designed to securely establish shared keys, not sign or verify data.
AES: AES is a symmetric encryption algorithm used for encrypting data, not for signing or verifying messages.
A software company is using Elliptic Curve Cryptography (ECC) to secure its communications. One of the team members suggests using ECC for both encrypting messages and signing them. Why would this not work for the signing process?
A. ECC is only used for key exchange.
B. ECC does not support signing directly; a specific algorithm like ECDSA is needed.
C. ECC cannot be used with public/private key pairs.
D. ECC cannot be used for encrypting data or signing.
Answer:
B. ECC does not support signing directly; a specific algorithm like ECDSA is needed.
Explanation:
Correct Option:
B: Elliptic Curve Cryptography (ECC) is a general cryptographic framework, not a digital signature algorithm by itself. To perform digital signing using ECC, you need a specific algorithm like ECDSA (Elliptic Curve Digital Signature Algorithm).
Incorrect Options:
A: ECC is not limited to key exchange. It can also be used for encryption and as a foundation for digital signature algorithms (e.g., ECDSA).
C: ECC is based on public/private key pairs and is used extensively in cryptography.
D: ECC is widely used for encrypting data and serves as a foundation for secure algorithms like ECDSA for signing.
Your team is evaluating different cryptographic algorithms for signing documents. One team member suggests using Diffie-Hellman for the signing process because it is a robust cryptographic algorithm. What is the main issue with this suggestion?
A. Diffie-Hellman is too slow for signing.
B. Diffie-Hellman is designed for key exchange, not signing.
C. Diffie-Hellman does not support asymmetric key pairs.
D. Diffie-Hellman does not use hashing.
Answer:
B. Diffie-Hellman is designed for key exchange, not signing.
Explanation:
Correct Option:
B: Diffie-Hellman is specifically designed for secure key exchange between parties and is not capable of signing or verifying data.
Incorrect Options:
A: The issue is not about speed; Diffie-Hellman is simply not designed for signing.
C: Diffie-Hellman does use asymmetric key pairs, but they are for secure key exchange, not for signing.
D: Hashing is not relevant to Diffie-Hellman’s purpose, as it is focused on exchanging keys, not signing or verifying data.
A company wants to adopt a digital signature algorithm for signing sensitive email messages. They consider RSA and AES as potential candidates. Why is RSA the correct choice in this context?
A. RSA uses hashing for integrity, while AES does not.
B. RSA can be used for digital signatures, but AES is only for encryption.
C. AES is faster but does not support public/private key pairs.
D. RSA supports both key exchange and encryption, making it better than AES.
Answer:
B. RSA can be used for digital signatures, but AES is only for encryption.
Explanation:
Correct Option:
B: RSA is an asymmetric encryption algorithm that supports both encryption and digital signature operations. AES, on the other hand, is a symmetric encryption algorithm and cannot be used for signing.
Incorrect Options:
A: While RSA uses hashing as part of the digital signature process, this is not the main reason AES cannot be used. AES simply does not support signing.
C: While AES is faster than RSA for encrypting data, it cannot sign data because it is symmetric.
D: The ability to perform key exchange is not directly relevant to why RSA is preferred for digital signatures.
Which of the following explains why specific algorithms like RSA, DSA, or ECDSA are used for digital signatures instead of encryption algorithms like AES ?
A. Digital signature algorithms use hashing to ensure integrity, while encryption algorithms do not.
B. Digital signature algorithms rely on public/private key pairs, which are not used in symmetric encryption.
C. Encryption algorithms cannot generate unique identifiers for messages.
D. Encryption algorithms are too slow for signing.
Answer:
B. Digital signature algorithms rely on public/private key pairs, which are not used in symmetric encryption.
Explanation:
Correct Option:
B: Digital signature algorithms are designed to work with asymmetric cryptography, which involves a public/private key pair. Symmetric algorithms like AES do not have this capability and therefore cannot be used for signing.
Incorrect Options:
A: While hashing is part of the digital signature process, it is not exclusive to digital signature algorithms. Encryption algorithms can also use hashing for other purposes.
C: This is not accurate; encryption algorithms do not generate unique identifiers for messages, but that is also not their purpose.
D: The issue is not speed, but rather the lack of support for public/private key operations in symmetric encryption algorithms.