Practical Cryptography Flashcards
Which is a common symmetric key block cipher? Choose more than one option.
A. RSA
B. AES-GCM
C. 3DES-EDE
D. AES-CBC
E. ECDSA
F. Blowfish
B. AES-GCM
C. 3DES-EDE
D. AES-CBC
F. Blowfish
Which is a scalable way to bind a public key with an entity identity and offer revocation services?
A. Diffie-Hellman key exchange
B. Digital signing services
C. Hashed message authentication
D. Public key infrastructure
D. Public key infrastructure
Which algorithm uses smaller key spaces while offering superior strength for mobile devices and IoT with limited memory and processing power?
A. RSA key exchange
B. Diffie-Helman key exchange
C. SHA-384
D. Elliptic curve
D. Elliptic curve
What is often a separate chip on the motherboard (TPM 2.0) that allows manufacturers to build the capability into their chipsets rather than requiring a separate chip?
A. Full disk encryption
B. Trusted platform module
C. Key management service
D. Hardware security module
B. Trusted platform module
What is a distributed database that leverages a constantly growing list of ordered records called blocks for asset transfer ledgers, cryptocurrencies, tokens, and smart contracts?
A. Blockchain
B. Tokenization
C. Counter block chaining
D. Steganography
A. Blockchain
Alice wants to send Bob a message with origin authentication. Which scenario would apply?
A. The message will be encrypted with Alice’s private key then decrypted with Alice’s public key
B. The message will be encrypted with Bob’s public key then decrypted with Bob’s private key
C. The message will be encrypted with Alice’s public key then decrypted with Alice’s private key
D. The message will be encrypted with Bob’s private key then decrypted with Bob’s public key
A. The message will be encrypted with Alice’s private key then decrypted with Alice’s public key
Which type of encryption involves the process of encoding all user data on a solid-state drive?
A. File encryption
B. Partition encryption
C. Volume encryption
D. Full disk encryption
D. Full disk encryption
Which is a scalable mechanism for providing authenticity, integrity, and non-repudiation using random public/private key pairs?
A. HMAC
B. Diffie-Hellman
C. Digital Signature
D. RSA
C. Digital Signature
What is the technique of adding pseudorandom data to a cryptographic hash function to make it less deterministic for cracking tools?
A. Salting
B. Hashing
C. Collisions
D. Encryption
A. Salting