In 2007, this wireless security algorithm was rendered useless by capturing packets and discovering the passkey in a matter of seconds. This security flaw led to a network invasion of TJ Maxx and data theft through a technique known as wardriving.
Which Algorithm is this referring to?
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.
A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.
Which of the following is a substitution cipher used by ancient Hebrew scholars?
In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
Which of the following areas is considered a strength of symmetric key cryptography when compared with asymmetric algorithms?
What best describes the shifting of each letter a fixed number of spaces to the left or right?
You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as
A ______ refers to a situation where two different inputs yield the same output.
Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.
Which of the following is an asymmetric algorithm that was first publically described in 1977?
Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?
What type of encryption uses different keys to encrypt and decrypt the message?
Network of trusted certificate authority servers. Use asymmetric key pairs and combines software, encryption and services to provide a means of protecting security of business communication and transactions.
Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?
When learning algorithms, such as RSA, it is important to understand the mathematics being used. In RSA, the number of positive integers less than or equal to some number is critical in key generation. The number of positive integers less than or equal to n that are coprime to n is called ______.
Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.
Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?
John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)
The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).
Which of the following algorithms uses three different keys to encrypt the plain text?
The most common way steganography is accomplished is via which one of the following?
Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?
Which service in a PKI will vouch for the identity of an individual or company?
Changes to one character in the plain text affect multiple characters in the cipher text, unlike in historical algorithms where each plain text character only affect one cipher text character.
A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.
This is a proprietary version of PAP. Encrypts username and password as it is sent across network.
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?
Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?