Fragen Flashcards
Steps in main rounds of AES encryption?
Mix Columns
ShiftRows
AddRoundkey
Subbytes
___ requires operators of essentialservice to implement appropriate
___ adresses an important issue within EU
___ enhance cyber security
NIS2 - Network…
DCRA
EU legislative instruments
requierements claudeshanan encryption procedures
-Diffusion
-Confusion
NIST objective (CS framework)
- Practices that are known to be effective are described in the NIST CS Framework
- can help organization begin their…
AES Algo for key length 128 bit contains how many rounds?
10
CIA
Confidentialit
Integrity
Availability
Activities to take appropriate action…
Develeop and implementappropriate…
Collecting all assets as Data…
Development and implementation of…
Plans to maintain…
Respond
Protect
Identify
Detect
Recover
True statements in regard of block ciphers
- plaintext is broken up
- Use operating models
- AES, DES 3DES
Doctor exchanges entry “allergic …”
Which security requirement is broken
Integrity
key lengths of AES
192 bit
256 bit
128 bit
Stream chipers true statements
- Generate a pseudorandom
- key not repeated.
As a replacement for DES and 3DES
- NIST
- call for prop
- symmetric
- 128, 192, and 256 bits
result in Diffusion
ShiftRows and MixColumns
NIST key function
Respond
protect
Identify
Detect
Recover
Asymetric encryption method
computionally more intesive…
uses key pair. One key used…
uses key pair. Message encrypted…
hybrid encryption
utelizes public key of recepient to encrypt symmetric
utelizes symmetric key to encrypt clear text
properties of hash functions
fast calculation
fixed length output
hard to gues input when hash is known