Week1 Flashcards
Which algorithm has replaced DES?
SHA
AES
MD5
RSA
AES
What does the term crypto in “cryptography” stand for?
Secret
Applied
Code
Writing
Secret
MD5 was popular for many years as a hashing algorithm, but has lost popularity recently as security researchers were able to find colliding hashes. Which algorithm would be the best replacement for MD5?
SHA
RSA
AES
DES
SHA
In computer science, what does cryptography help ensure?
Confidentiality of data in motion and availability of data at rest
Availability of data in motion and confidentiality of data at rest.
Availability of data in motion and data at rest
Confidentiality of data in motion and data at rest
Confidentiality of data in motion and data at rest
Which factor can be ignored when attempting secret communication?
Integrity.
Encryption.
Authentication.
Communication medium.
Communication medium.
Which technology is unnecessary for conducting a coin toss over the phone?
Third-party verification.
Random number generator.
Communication medium.
Collision-free hashing.
Third-party verification.
Which step is undertaken to ensure than an encryption algorithm is functional?
Finding the weaknesses in an algorithm.
Disclosing an algorithm to the public.
Reverse-engineering an encryption.
Proving that the integrity of an algorithm is weak
Disclosing an algorithm to the public.
Of the provided options, which may be the best reason for DES to be considered as an insecure algorithm?
It was discarded as its design is very old.
Practically exploitable weaknesses have been found in its design other than brute-force.
It uses an architecture that modern computers cannot support.
Computers became fast enough that it was possible to brute-force the key.
Computers became fast enough that it was possible to brute-force the key.
Correct! It only used 56 bits and enumerating every key in a short amount of time is possible for modern day computers.
Which is the minimum required bit length for strong AES encryption?
256
64
56
128
128
Why is it difficult to modify or design new encryption algorithms?
Because of the monetary costs associated with it.
Because all good designs have already been researched and patented.
Because it is difficult to analyze how these algorithms work.
Because it is difficult to find potential flaws in the algorithms
Because it is difficult to find potential flaws in the algorithms
Correct! An algorithm is often difficult to prove mathematically and hence it cannot be verified for sure in small number of use cases whether there are any flaws in the algorithm or not unless it’s extensively tested.
When is a hash function considered “broken”?
When it is possible to find the same output hash for different inputs.
When it is not possible to find colliding inputs for the same output.
When it is possible to find the same input for different output hash.
When it is not possible to find colliding outputs for the same input.
When it is possible to find the same output hash for different inputs.
Correct! This is also known as a hash collision.
When is an encryption algorithm considered “broken”?
When the output can be reversed to input without needing the key.
When the output cannot be reversed to input without using the key.
When the output cannot be reversed to input using the key.
When the output can be reversed to input using the key.
When the output can be reversed to input without needing the key.
Correct! For example, a Caesarian cipher can be brute-forced, so it is considered a broken algorithm
Of the provided options, which is the best way to break well-established cryptographic protocols similar to AES?
Using flaws that exist in the design
Using malformed input
Using brute-force techniques
Using side-channel attacks
Using side-channel attacks
Which properties apply to numbers used in cryptography?
Real Numbers
Positive or Negative Integers
Rational Numbers
Positive Integers
Positive Integers
Which properties apply to numbers used in cryptography?
Very large numbers, but still finite
Rational numbers
All positive and negative integers
Complex and imaginary numbers
Very large numbers, but still finite
What is the definition of a block?
A block is defined as “data broken into fixed-sized chunks with a constant number of zeros per block.
A block is defined as “data broken into fixed-sized chunks with a constant number of bits per block.”
A block is defined as “data broken into fixed-sized chunks with a constant number of ones per block.
A block is defined as “data broken into fixed-sized chunks with a constant number of digits per block.”
A block is defined as “data broken into fixed-sized chunks with a constant number of bits per block.”
How do prime numbers make RSA secure?
Prime numbers make RSA secure because it is very difficult to factorize a prime number.
Prime numbers make RSA secure because it is very difficult to multiply more than one large prime number.
Prime numbers make RSA secure because it is very difficult to factorize the multiplication of large prime numbers.
Prime numbers make RSA secure because it is very difficult to find more than one large prime number
Prime numbers make RSA secure because it is very difficult to factorize the multiplication of large prime numbers.
Correct! Given a number generated from the multiplication of two large prime numbers, it is difficult to figure out what those numbers were.
What is true about prime numbers as we move toward infinity?
As we move toward infinity, the number of even prime numbers continues to increase.
As we move toward infinity, the distance between two primes decreases
As we move toward infinity, the distance between two primes increases.
As we move toward infinity, the density of prime numbers increases exponentially.
As we move toward infinity, the distance between two primes increases.
Which of the following encryption algorithms uses symmetric keys?
Diffie Hellman
AES
ECC
RSA
AES
Correct! The same key is used to encrypt and decrypt the data. The algorithms used for encryption and decryption might differ.