Module 20 - Cryptography Flashcards
Which type of encryption uses 2 keys (Public & Private)
Asymmetric Encryption
Which type of encryption uses 1 shared secret key?
Symmetric Encryption
All of the following are types of Symmetric Encryption except:
a. AES
b. Twofish
c. RC4
d. DES
e. DSA
f. 3DES
g. Blowfish
e. DSA
Which of the following Symmetric Encryptions is a stream cipher?
a. AES
b. Twofish
c. RC4
d. DES
e. DSA
f. 3DES
g. Blowfish
c. RC4
What does symmetric encryption provide?
a. Confidentiality
b. Integrity
c. Authenticity
d. Availability
e. Non-Repudiation
a. Confidentiality
What is the #1 used symmetric encryption used today?
AES
What is the #1 asymmetric encryption used today?
RSA
All of the following are types of asymmetric encryption except?
a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal
c. DES
Which of the following asymmetric encryptions is used for key enchange of symmetric keys?
a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal
e. Diffie-Hellman
Which of the following asymmetric encryptions provides Non-Repudiation?
a. RSA
b. DSA
c. DES
d. ECC
e. Diffie-Hellman
f. El Gamal
Non repudiantion is a propriety of singatures.
All listed above provide signatures.
a. RSA
b. DSA
d. ECC
f. El Gamal
REF:https://en.wikipedia.org/wiki/Digital_signature#Some_digital_signature_algorithms
By default what is the encryption strength of AES?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
c. 128 bit
What is the encryption strength of blowfish?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
d. 64 bit
Comments: Defalut Key Sizes:
DES -> 56 bits
3DES->168 bits
AES-> 128 (also 192, 256)
RC4-> 64 bits
Blowfish->64 bits (also 32-448)
Twofish -> 128 bits
What is the encryption strength of RC4?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
e. 1 bit or 1 byte
???
The tipical key size was 64 bits.
What is the encryption strength of DES?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
a. 56 bit (error)
Is not a good ideia ask about a encryption strength because it is related with some diferents things. It depends on a lot of things:
- Key length
- Key management policies
- Nature of encryption algorithm (block size, stream cipher, etc)
From NIST.SP.800-57pt1r4.pdf: Section 5.3.1
Security strength (Also “bits of security”) A number associated with the amount of work (that is, the number of operations) that is required to break a cryptographic algorithm or system. In this Recommendation, the security strength is specified in bits and is a specific value from the set {80, 112, 128, 192, 256}.
“The strength of the cryptographic mechanisms (e.g., the algorithm, key length, block size, and mode of operation)”
One might expect that 3TDEA would provide 56 × 3 = 168 bits of strength. However, there is an attack on 3TDEA that reduces the strength to the work that would be involved in exhausting a 112-bit key. For 2TDEA, if exhaustion were the best attack, then the strength of 2TDEA would be 56 × 2 = 112 bits
But sometimes, when someone is asking about the encryption strength, is talking about the key length or the key strength.
What is the encryption strength of twofish?
a. 56 bit
b. 168 bit
c. 128 bit
d. 64 bit
e. 1 bit or 1 byte
c. 128 bit