Which of the following acts as a verifier for the certificate authority?
A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.
Which of the following is an asymmetric cipher?
Which service in a PKI will vouch for the identity of an individual or company?
An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.
A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed
Which of the following would be the weakest encryption algorithm?
Which of the following would be the fastest.
If the round function is a cryptographically secure pseudorandom function, then ___________ rounds is sufficient to make the block cipher a pseudorandom permutation.
Which of the following is used to encrypt email and create digital signatures?
A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.
If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.
Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.
Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186
A number that is used only one time, then discarded is called what?
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
With Electronic codebook (ECB) what happens:
Which one of the following is a symmetric key system using 64-bit blocks?
What does the OCSP protocol provide?
The time and effort required to break a security measure.
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?
Which one of the following terms describes two numbers that have no common factors?
Which of the following is an asymmetric algorithm that was first publically described in 1977?
____________cryptography uses one key to encrypt a message and a different key to decrypt it.
Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.
In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?
What type of encryption uses different keys to encrypt and decrypt the message?
If you wished to see a list of revoked certificates from a CA, where would you look?
3DES can best be classified as which one of the following?
_____ uses at least two different shifts, changing the shift with different letters in the plain text.
Which of the following equations is related to EC?
During the process of encryption and decryption, what keys are shared?
Which of the following is a protocol for exchanging keys?
Which of the following is not a key size used by AES?
A linear congruential generator is an example of what?
Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).
Which of the following is the successor of SSL?
Developed by Netscape and has been replaced by TLS. It was the preferred method used with secure websites.
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?
Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?
In 1977 researchers and MIT described what asymmetric algorithm?
Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.
Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
RFC 1321 describes what hash?
Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.
A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.
What does Output feedback (OFB) do:
Which of the following is the standard for digital certificates?
A part of understanding symmetric cryptography understands the modes in which it can be used. You are
explaining those modes to a group of cryptography students. The most basic encryption mode is____________.
The message is divided into blocks, and each block is encrypted separately with no modification to the process.
Which one of the following is a component of the PKI?
Electromechanical rotor-based cipher used in World War II
Cryptographic hashes are often used for message integrity and password storage. It is important to understand the common properties of all cryptographic hashes. What is not true about a hash?
Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?
The ATBASH cipher is best described as what type of cipher?
Which of the following techniques is used (other than brute force) to attempt to derive a key?
What size block does Skipjack use?
Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.
Which one of the following uses three different keys, all of the same size?