Module 8 - Cryptographic Methods - Q&A Flashcards

1
Q
How many rounds does DES use in its encryption process?
A. 48
B. 32
C. 1
D. 16
A

D. DES uses 16 rounds of encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following algorithms won the competition to become the Advanced Encryption Standard?
A. Rijndael
B. MARS
C. RC6
D. Twofish
A

A. Rijndael won the NIST-sponsored competition to become the Advanced Encryption Standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the following is a symmetric streaming algorithm?
A. 3DES
B. RC4
C. AES
D. Blowfish
A

B. RC4 is a symmetric streaming algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following can be used to assure both authenticity and integrity of a message?
A. RIPEMD
B. HMAC-SHA2
C. AES
D. Twofish
A

B. HMAC-SHA2 is a method that would use the SHA-2 hashing algorithm, as well as a symmetric key, to produce a Message Authentication Code, ensuring both authenticity and integrity of the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
Which of the following asymmetric algorithms uses a maximum key size of 4,096 bits?
A. AES
B. Diffie-Hellman
C. RSA
D. ECC
A

C. RSA uses key sizes between 1,024 and 4,096 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following asymmetric algorithms is widely used on mobile devices because of its low computational power requirements?
A. ECC
B. ElGamal
C. Diffie-Hellman
D. GPG
A

A. Elliptic Curve Cryptography (ECC) is an asymmetric algorithm widely found in use on mobile devices because it requires low amounts of computational power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following algorithms is based upon computing discrete logarithms?
A. Diffie-Hellman
B. RSA
C. ECC
D. ElGamal
A

D. The ElGamal asymmetric algorithm is based upon mathematical problems involving computing discrete logarithms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

All of these are characteristics of the hashing process, except:
A. Cannot be decrypted
B. Used to assure integrity
C. Uses AES as a hashing algorithm
D. Produces fixed-length digests representing variable-length text

A

C. AES is not a hashing algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
All of the following are valid iterations of the RIPEMD hashing algorithm, except:
A. RIPEMD-384
B. RIPEMD-320
C. RIPEMD-160
D. RIPEMD-256
A

A. There is no RIPEMD-384 version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following algorithms produces a 40-character message digest?
A. MD5
B. SHA-1
C. RIPEMD-128
D. Blowfish Answers
A

B. SHA-1 is a 160-bit hashing algorithm that produces a 40-character hexadecimal message digest, or hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly