Cryptography Flashcards

1
Q

Diffie-Hellman groups

A

Diffie-Hellman group 1—768 bit group
Diffie-Hellman group 2 —1024 bit group
Diffie-Hellman group 5—1536 bit group
Diffie-Hellman group 14—2048 bit group
Diffie-Hellman group 19—256 bit elliptic curve
Diffie-Hellman group 20—384 bit elliptic curve group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the algorithms provides better protection against brute force attacks by using a 160-bit message digest?

A

SHA-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

MD5

A

Can be cracked by brute-force attack and suffers from extensive vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

RC4

A

is ideal for software implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MD4

A

used to verify data integrity through the creation of a 128-bit message digest from data input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which optimized for confidential communications, such as bidirectional voice and video

A

RC4 enables safe communications such as traffic encryption (which secures websites) and for websites that use the SSL protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advanced encryption standard ( AES ) is an algorithm used for

A

Bulk data encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which contains a public key and the identity of the owner and the corresponding private key is kept secret by the certification authorities

A

Signed certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

popular CAs

A

Comodo, IdenTrust, Symantec, and GoDaddy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cross certification

A

enables entities in one PKI to trust entities in another PKI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Describes a component of public key infrastructure (PKI) where a copy of a private key is stored to provide third-party access and to facilitate recovery operations?

A

Key escrow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which element of public key infrastructure (PKI) verifies the applicant?

A

Registration authority (RA): This acts as the verifier for the certificate authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which Cryptography attack methods is usually performed without the use of a computer?

A

Rubber Hose attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which cryptanalysis methods is applicable to symmetric key algorithms?

A

Differential cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In which attack can an attacker obtain ciphertexts encrypted under two different keys and gather plaintext and matching ciphertext?

A

Related-key attack. The related-key attack is similar to the chosen plaintext attack except that the attacker can obtain ciphertexts encrypted under two different keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An attacker breaks an n bit key cipher into 2 n/2 number of operations in order to recover the key. Which cryptography attack is he performing?

A

Chosen-key attack

17
Q

Which attack is a physical attack that is performed on a cryptographic device/cryptosystem to gain sensitive information?

A

Side channel attack

18
Q

Which of the following attacks mainly affects any hardware/software using an ANSI X9.31 random number generator (RNG)?

A

DUHK attack

19
Q

attack that is used for cracking a cryptographic algorithm using multiple keys for encryption.

A

Meet-in-the-middle Attack

20
Q

SHA-512 encryption uses ____ bit words

A

64

21
Q

The Encrypted information is known as a ____

A

Cipher