Cryptography important info Flashcards
Which encryption standard uses the same key to encrypt and decrypt messages?
Symmetric?
Asymmetric?
Rivest-Shamir-Adleman (RSA)?
Digital Signature Algorithm (DSA)?
Symmetric
Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)?
Data Encryption Standard (DES)
Secure hash algorithm (SHA)
Skipjack
PEGASUS
Skipjack
What is the most commonly used format for certificates?
X.509 v1
X.509 v3
Secure Hash Algorithm 1 (SHA-1)
Secure Hash Algorithm 2 (SHA-2)
X.509 v3
What is referenced to determine if a certificate has been revoked?
Certificate revocation list (CRL)
Data Encryption Standard (DES)
Rivest-Shamir-Adleman (RSA)
Secure hash algorithm (SHA)
Certificate revocation list (CRL)
What needs to be installed on end users’ computers to allow them to trust applications that have been digitally signed by the developer?
Sender’s public key
Sender’s private key
Administrator’s public key
Administrator’s private key
Sender’s public key
Which type of certificate must be certified by an authority to verify it with other participants?
Public
Root
Private
Domain
Public
What is an attribute of the Rivest Cipher 4 (RC4) algorithm?
It encrypts whole blocks of data at a time.
It is an asymmetric cipher.
Its keys are longer than the encrypted message.
It requires a unique nonce.
It requires a unique nonce.
Which mode generates the key stream with a nonce and incrementing value?
Electronic codebook (ECB)
Cipher block chaining (CBC)
Output feedback (OFB)
Counter (CTR)
Counter (CTR)
Which mode is a stream algorithm that concatenates an incrementing value with a nonce?
Electronic codebook (ECB)
Cipher block chaining (CBC)
Output feedback (OFB)
Counter (CTR)
Counter (CTR)
Which key would an administrator use to encrypt data so only the CEO can decrypt it?
Administrator’s private key
Administrator’s public key
CEO’s private key
CEO’s public key
CEO’s public key
What is the result of a hash function?
Digest
Signature
Ciphertext
Plaintext
Digest
What is used to efficiently encrypt large files?
Hash function
XML function
Asymmetric encryption
Symmetric encryption
Symmetric encryption
An administrator needs to encrypt the following word with the Atbash cipher:
security
Which ciphertext is correct?
hvxfirgb
hemfirjc
hexfirgc
hyxfigrb
hvxfirgb
Which cryptographic algorithm has a 128-bit hash size?
Secure Hash Algorithm 1 (SHA-1)
Message Digest Algorithm 5 (MD5)
Triple Data Encryption Standard (3DES)
Advanced Encryption Standard (AES)
Message Digest Algorithm 5 (MD5)
Which characteristic makes a hashing function suitable for use in signature schemes?
Varying operational modes
Use of bit-by-bit encryption
Use of unique key values
Collision resistance
Collision resistance
Which attribute of a hashing function makes a birthday attack possible?
Man-in-the-middle detection
Partial-message collision
Brute-force protection
Plaintext
Partial-message collision
Which hash algorithm produces a 160-bit output value?
SHA-1
MD5
SHA-2
Diffie-Hellman
SHA-1
What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext?
Counter
Nonce
Previous generated ciphertext
Previous plaintext
Previous generated ciphertext
Which mode produces the same ciphertext from two identical plaintext blocks?
Electronic codebook (ECB)
Which encryption mode is least secure?
Cipher block chaining (CBC) Cipher feedback (CFB) Electronic codebook (ECB) Output feedback (OFB)
Electronic codebook (ECB)
What is the mathematical formula used for symmetric decryption?
P = E (K,C) C = E (K,P) E = C (K,P) K = C (P,E)
P = E (K,C)
Which algorithm relies on factoring the product of large prime numbers?
Elliptical curve
ElGamal
Rivest–Shamir–Adleman
Diffie–Hellman
Rivest–Shamir–Adleman
Which encryption technology is a serial combination of hashing, data compression, symmetric-key cryptography, and public key infrastructure (PKI) and can be used for encrypting texts, emails, files, and directories or for full disk encryption?
Pretty Good Privacy (PGP)
Wired Equivalent Privacy (WEP)
Diffie–Hellman (DH)
Rivest–Shamir–Adleman (RSA)
Pretty Good Privacy (PGP)
Which concept stipulates that algorithms should be openly shared and scrutinized, but keys must be absolutely secured?
Communication Theory of Secrecy Systems
Kerckhoffs’s principle
Feistel function
Mathematical Theory of Communication
Kerckhoffs’s principle