Module 8 - Cryptographic Methods - Q&A Flashcards
How many rounds does DES use in its encryption process? A. 48 B. 32 C. 1 D. 16
D. DES uses 16 rounds of encryption.
Which of the following algorithms won the competition to become the Advanced Encryption Standard? A. Rijndael B. MARS C. RC6 D. Twofish
A. Rijndael won the NIST-sponsored competition to become the Advanced Encryption Standard.
Which of the following is a symmetric streaming algorithm? A. 3DES B. RC4 C. AES D. Blowfish
B. RC4 is a symmetric streaming algorithm.
Which of the following can be used to assure both authenticity and integrity of a message? A. RIPEMD B. HMAC-SHA2 C. AES D. Twofish
B. HMAC-SHA2 is a method that would use the SHA-2 hashing algorithm, as well as a symmetric key, to produce a Message Authentication Code, ensuring both authenticity and integrity of the message.
Which of the following asymmetric algorithms uses a maximum key size of 4,096 bits? A. AES B. Diffie-Hellman C. RSA D. ECC
C. RSA uses key sizes between 1,024 and 4,096 bits.
Which of the following asymmetric algorithms is widely used on mobile devices because of its low computational power requirements? A. ECC B. ElGamal C. Diffie-Hellman D. GPG
A. Elliptic Curve Cryptography (ECC) is an asymmetric algorithm widely found in use on mobile devices because it requires low amounts of computational power.
Which of the following algorithms is based upon computing discrete logarithms? A. Diffie-Hellman B. RSA C. ECC D. ElGamal
D. The ElGamal asymmetric algorithm is based upon mathematical problems involving computing discrete logarithms.
All of these are characteristics of the hashing process, except:
A. Cannot be decrypted
B. Used to assure integrity
C. Uses AES as a hashing algorithm
D. Produces fixed-length digests representing variable-length text
C. AES is not a hashing algorithm.
All of the following are valid iterations of the RIPEMD hashing algorithm, except: A. RIPEMD-384 B. RIPEMD-320 C. RIPEMD-160 D. RIPEMD-256
A. There is no RIPEMD-384 version.
Which of the following algorithms produces a 40-character message digest? A. MD5 B. SHA-1 C. RIPEMD-128 D. Blowfish Answers
B. SHA-1 is a 160-bit hashing algorithm that produces a 40-character hexadecimal message digest, or hash.