Fragen Flashcards
Steps in main rounds of AES encryption?
Mix Columns
ShiftRows
AddRoundkey
Subbytes
___ requires operators of essentialservice to implement appropriate
___ adresses an important issue within EU
___ enhance cyber security
NIS2 - Network…
DCRA
EU legislative instruments
requierements claudeshanan encryption procedures
-Diffusion
-Confusion
NIST objective (CS framework)
- Practices that are known to be effective are described in the NIST CS Framework
- can help organization begin their…
AES Algo for key length 128 bit contains how many rounds?
10
CIA
Confidentialit
Integrity
Availability
Activities to take appropriate action…
Develeop and implementappropriate…
Collecting all assets as Data…
Development and implementation of…
Plans to maintain…
Respond
Protect
Identify
Detect
Recover
True statements in regard of block ciphers
- plaintext is broken up
- Use operating models
- AES, DES 3DES
Doctor exchanges entry “allergic …”
Which security requirement is broken
Integrity
key lengths of AES
192 bit
256 bit
128 bit
Stream chipers true statements
- Generate a pseudorandom
- key not repeated.
As a replacement for DES and 3DES
- NIST
- call for prop
- symmetric
- 128, 192, and 256 bits
result in Diffusion
ShiftRows and MixColumns
NIST key function
Respond
protect
Identify
Detect
Recover
Asymetric encryption method
computionally more intesive…
uses key pair. One key used…
uses key pair. Message encrypted…
hybrid encryption
utelizes public key of recepient to encrypt symmetric
utelizes symmetric key to encrypt clear text
properties of hash functions
fast calculation
fixed length output
hard to gues input when hash is known
Hashing functions
- outputs value of fixed size
- easy to calculate hash value of perimage M
MAC “Message Authentication Code”
- is calculated on basis…
- small block of data
Quantum technology
break key exchange
Quantum key distrib
Quantum key distrib
The certificate is signed using the public key of certificate authority (True/false)
False
Quantum computer
quantem phenomenon
shor algo
break key exchange
The___standard is used to define info
the ____ is a field described…
X.509
Certificate Authority issuer name
why do we need digital certificate?
to ensure public key belongs to a person, device org.