Security Module 5 Flashcards
What is a benefit of using a combination of symmetrical and asymmetrical cryptography when transferring data across the internet?
Asymmetrical cryptography is necessary to establish a secure connection and symmetrical cryptography can enhance the speed of the data transmission after the fact
Which solution is ideal for encrypting an entire hard drive of a PC?
Bitlocker
NTRUEncrypt is based on which cryptography method?
Lattice-based
“Plaintext” is a term that is best described as what?
Data in an unencrypted form
Why would a security administrator use perfect forward secrecy instead of other key exchange solutions?
If compromised it can only expose the content of a single message
Why is a homoalphabetic substitution considered a stream cipher?
It encrypts one plaintext character at a time
What is the disadvantage of TSA compared to most symmetrical algorithms?
RSA is complicated and slower than other algorithms
What are the differences between a block cipher and a sponge function?
A block cipher encrypts plaintext at a fixed size whereas a sponge function takes input string at any length
An encrypted digest is produced from what?
Hash algorithm
Which of the following encryption algorithms has not been successfully attacked?
AES
Which of the following is an advantage of the Keccak algorithm?
It is a compact algorithm that could be considered ideal for smaller devices and appliances
A digital signature does NOT provide which of the following?
Redundancy
How is a hash algorithm limited in functionality?
It cannot be decrypted
OTPs were originally used by whom?
Resistance groups and operation teams during World War II
How does SHA-1 differ from the MD4 algorithm?
MD4 creates a digest length of 128 bit whereas SHA-1’s digest length is 160 bits