Cryptology Flashcards

1
Q

If a particular cipher uses 128 bit keys, and can be brute-forced in 100 years, how many years would it take to brute-force that same cipher if the keys are increased to 130 bits?

A

400 (Power = KeySpace / Time where KS = 2exp-bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which statement is false ? a. Generally, symmetric ciphers are much faster than asymmetric ciphers. b. The two major cipher types are block ciphers and stream ciphers. c. Cryptanalysis is the process of brute-forcing keys. d. Chaining used in conjunction with a block cipher enhances the strength of the encryption.

A

c. Cryptanalysis is the process of brute-forcing keys. (Cryptanalysis is the unwrapping of the algorithms)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In addition to intense public scrutiny/review, the dominant factor contributing to the security strength of most modern encryption ciphers is a. key length b. the secrecy of the underlying cipher algorithm c. the use of parallelism to divide the key space d. chaining to increase the time required to test each key

A

a. key length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a given cipher algorithm uses 100 iterations of processing for a single block of plaintext and key, and each iteration i is dependent upon iteration i-1; then a single 800MHz CPU could check a theoretic-cal maximum of ______ keys per second. (assume no pipelining or other “tricks”)

A

8 million 800MHz (cycles/sec) and 100 keys/sec => 800x10exp6 cycles/sec / 100 keys/sec = 8x10exp6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of these represent hashes (or hash “functions”)? a. Human birthdates b. Modulo arithmetic c. Truncate function d. All the above are examples of hashes

A

d. All the above are examples of hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

According to Moore’s Law, approximately how much “faster” will computers be 30 years from now? a. about 1,000 times faster b. about 32,000 times faster c. about 1,000,000 times faster d. about 64,000,000 times faster

A

c. about 1,000,000 times faster Py = Pnow x 2exp(y/1.5) P30 = P0 x 2exp(30/1.5) = 1048576

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The term “collision” when applied to hashing algorithms is best defined as a. the size of the “fingerprint”. b. two separate messages hashing to the same “fingerprint”. c. a “fingerprint” that does not properly un-hash back to the original message. d. a single message that hashes to two or more different “fingerprints”.

A

b. two separate messages hashing to the same “fingerprint”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Proper management of public keys requires that they… a. can be distributed without any protection b. need to have their integrity protected in the form of a digital certificate c. should be kept confidential d. should be “signed” with the issuer’s public key

A

b. need to have their integrity protected in the form of a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Digital certificates… a. contain the owner’s private key and are signed with the CA’s private key. b. contain the owner’s private key and are signed with the CA’s public key. c. contain the owner’s public key and are signed with the CA’s public key. d. contain the owner’s public key and are signed with the CA’s private key.

A

d. contain the owner’s public key and are signed with the CA’s private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Briefly describe the two reasons that we cannot generally (i.e., for all types of message exchanges) rely on the “readability” of decrypted plaintext to ensure it has decrypted correctly. 1. _________________________ 2. _________________________

A
  1. Non Human Reader 2. Non Human Readable Text
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the approximate bit-entropy of an 8 (decimal) digit PIN? [log2 = 0.3] a. ~19 b. ~42 c. ~96 d. ~26

A

d. ~26 X = log(password space) / log2 => X = 8 / 0.3 Check this!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly