A method for cracking modern cryptography. The attacker obtains the cipher texts corresponding to a set of plain texts of own choosing. Allows the attacker to attempt to derive the key. Difficult but not impossible.
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?
What is the largest key size that AES can use?
A _____ is a function is not reversible.
Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.
What must occur in order for a cipher to be considered ‘broken’?
In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?
Which of the following is a key exchange protocol?
Denis is looking at an older system that uses DES encryption. A colleague has told him that DES is insecure due to a small key size. What is the key length used for DES?
What size key does Skipjack use?
WPA2 uses AES for wireless data encryption at which of the following encryption levels?
Which of the following is not a key size used by AES?
A real time protocol for verifying certificates (and a newer method than CRL).
A list of certificates that have been revoked.
Which of the following is an asymmetric algorithm that was first publically described in 1977?
This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.
Which of the following acts as a verifier for the certificate authority?
Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?
During the process of encryption and decryption, what keys are shared?
Which one of the following attempts to hide data in plain view?
A number that is used only one time, then discarded is called what?
A simple algorithm that will take the initial key and from that generate a slightly different key each round.
A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.
Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. If a single change of a single bit in the plaintext causes changes in all the bits of the resulting ciphertext, what is this called?
What does Output feedback (OFB) do:
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?
Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.
A ______ refers to a situation where two different inputs yield the same output.
Which one of the following are characteristics of a hash function? (Choose two)
Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
In 1977 researchers and MIT described what asymmetric algorithm?
In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.
Which Algorithm is this referring to?
John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)
Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.
If you use substitution alone, what weakness is present in the resulting cipher text?
What size block does FORK256 use?
____________cryptography uses one key to encrypt a message and a different key to decrypt it.
A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?
Which of the following encryption algorithms relies on the inability to factor large prime numbers?
What is a variation of DES that uses a technique called Key Whitening?
Ciphers that write message letters out diagonally over a number of rows then read off cipher row by row. Also called zig-zag cipher.
Which of the following is required for a hash?
Which of the following is a protocol for exchanging keys?
If you wished to see a list of revoked certificates from a CA, where would you look?
Which of the following uses an 80 bit key on 64 bit blocks?
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?
A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.
Which one of the following is an authentication method that sends the username and password in cleartext?
With Cipher feedback (CFB) what happens?
John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?
John works as a cryptography consultant. He finds that people often misunderstand the reality of breaking a cipher. What is the definition of breaking a cipher?
In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?
_____ uses at least two different shifts, changing the shift with different letters in the plain text.
How did the ATBASH cipher work?
Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?
3DES can best be classified as which one of the following?
A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.
You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as