Module 20 - Cryptography Flashcards

1
Q

Which type of encryption uses 2 keys (Public & Private)

A

Asymmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of encryption uses 1 shared secret key?

A

Symmetric Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

All of the following are types of Symmetric Encryption except:

a. AES
b. Twofish
c. RC4
d. DES
e. DSA
f. 3DES
g. Blowfish

A

e. DSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following Symmetric Encryptions is a stream cipher?

a. AES
b. Twofish
c. RC4
d. DES
e. DSA
f. 3DES
g. Blowfish

A

c. RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does symmetric encryption provide?

a. Confidentiality
b. Integrity
c. Authenticity
d. Availability
e. Non-Repudiation

A

a. Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the #1 used symmetric encryption used today?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the #1 asymmetric encryption used today?

A

RSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All of the following are types of asymmetric encryption except?

a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal

A

c. DES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following asymmetric encryptions is used for key enchange of symmetric keys?

a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal

A

e. Diffie-Hellman

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following asymmetric encryptions provides Non-Repudiation?

a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal

A

Non repudiantion is a propriety of singatures.

All listed above provide signatures.

a. RSA
b. DSA
d. ECC
f. El Gamal

REF:https://en.wikipedia.org/wiki/Digital_signature#Some_digital_signature_algorithms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

By default what is the encryption strength of AES?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

c. 128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the encryption strength of blowfish?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

d. 64 bit

Comments: Defalut Key Sizes:

DES -> 56 bits

3DES->168 bits

AES-> 128 (also 192, 256)

RC4-> 64 bits

Blowfish->64 bits (also 32-448)

Twofish -> 128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the encryption strength of RC4?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

e. 1 bit or 1 byte

???

The tipical key size was 64 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the encryption strength of DES?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

a. 56 bit (error)

Is not a good ideia ask about a encryption strength because it is related with some diferents things. It depends on a lot of things:

  • Key length
  • Key management policies
  • Nature of encryption algorithm (block size, stream cipher, etc)

From NIST.SP.800-57pt1r4.pdf: Section 5.3.1

Security strength (Also “bits of security”) A number associated with the amount of work (that is, the number of operations) that is required to break a cryptographic algorithm or system. In this Recommendation, the security strength is specified in bits and is a specific value from the set {80, 112, 128, 192, 256}.

“The strength of the cryptographic mechanisms (e.g., the algorithm, key length, block size, and mode of operation)”

One might expect that 3TDEA would provide 56 × 3 = 168 bits of strength. However, there is an attack on 3TDEA that reduces the strength to the work that would be involved in exhausting a 112-bit key. For 2TDEA, if exhaustion were the best attack, then the strength of 2TDEA would be 56 × 2 = 112 bits

But sometimes, when someone is asking about the encryption strength, is talking about the key length or the key strength.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the encryption strength of twofish?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

c. 128 bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the encryption strength of 3DES?

a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte

A

b. 168

(key size)

17
Q

_____ is a set of hardware, software, people, policies, and procedures required to create, manage, distribute, use, store, and revoke digital certificates.

A

PKI (Public Key Infrastructure)

18
Q

Public Key Infrastructure (PKI):

  • Issues and verifies digital certificates.
  • Keeps the private key, and gives the company the public key for them to publish.
    a. Registration Authority (RA)
    b. Validation Authority (VA)
    c. Certificate Authority (CA)
    d. Digital Certificate
A

c. Certificate Authority (CA)

19
Q

Public Key Infrastructure (PKI):

  • Acts as the verifier for the certificate authority.
  • Intermediary between the company and CA.
  • Cannot Issue Certificates
    a. Registration Authority (RA)
    b. Validation Authority (VA)
    c. Certificate Authority (CA)
    d. Digital Certificate
A

a. Registration Authority (RA)

20
Q

Disk Encryption:

Disk encryption protects ___________ of the data stored on disk by converting it into an unreadable code using disk encryption software or hardware.

a. Protection
b. Availability
c. Confidentiality
d. Encryption

A

c. Confidentiality

21
Q

Cryptanalysis:

  • Contains many non-repeating groups of letters or number keys, which are chosen randomly.
  • Only usable once activated, not before and will only be usable for a determined amount of time.
    a. Brute-Force
    b. Frequency Analysis
    c. Trickery and Deceit
    d. One-Time Pad
A

d. One-Time Pad

22
Q

Cryptanalysis:

Extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture.

a. Chosen-Ciphertext Attack
b. Rubber Hose Attack
c. Chosen-Key Attack
d. Timing Attack
e. Man-in-the-Middle Attack

A

b. Rubber Hose Attack

23
Q

________ encryption uses the same key for encryption as it does for decryption.

A

Symmetric

24
Q

__________ encryption uses different encryption keys for enctyption and decryption.

A

Asymmetric

25
Q

All of the following are email encryptions except?

a. TLS
b. S/MIME
c. PGP
d. GPG.

A

a. TLS

Comments

  • TLS is used to cripty http trafic,
  • GPG is a GnuPG, a complete and free implementation of the OpenPGP standard