a. To determine the strength of an algorithm
b. To increase the substitution functions in a cryptographic algorithm
c. To decrease the transposition functions in a cryptographic algorithm
d. To determine the permutations used
a. The increased use of permutations and transpositions in algorithms.
b. As algorithms get stronger, they get less complex, and thus more susceptible to attacks.
c. The increase in processor speed and power.
d. The reduction in key length over time.
a. It converts a message of arbitrary length into a value of fixed length.
b. Given the digest value, it should be computationally infeasible to find the corresponding message.
c. It should be computationally infeasible to derive the same digest from two different messages.
d. It converts a message of fixed length to an arbitrary length value
a. The public key has been altered.
b. The private key has been altered.
c. The message digest has been altered.
d. The message has been encrypted properly.
a. Data Encryption Standard
b. Digital Signature Standard
c. Secure Hash Algorithm
d. Data Signature Standard
a. Man-in-the-middle attack (transmission)
b. Birthday attack
c. Denial of service attack (Attack on Availability)
d. Dictionary attack
a. It can provide digital signature and encryption functionality.
b. It uses fewer resources and encrypts quicker because it uses symmetric keys.
c. It is a block cipher versus a stream cipher.
d. It employs a one-time encryption pad. (IPSec or SSL)
a. Without standards, there would be many interoperability issues when trying to employ different algorithms into different programs.
b. It can be used by some countries against their local people.
c. Criminals could use encryption to avoid detection and prosecution.
d. Laws are way behind, so adding different types of encryption would confuse the laws more.
a. The receiver’s private key
b. The sender’s public key
c. The sender’s private key
d. The receiver’s public key
a. A method of transferring a handwritten signature to an electronic document
b. A method to encrypt confidential information (Confidentiality Algorithms anyone?)
c. A method to provide an electronic signature and encryption
d. A method to let the receiver of the message prove the source and integrity of a message
a. 56
b. 64
c. 32
d. 16
a. If the user’s public key has become compromised
b. If the user changed over to using the PEM model that uses a web of trust
c. If the user’s private key has become compromised
d. If the user moved to a new location
a. Data Encryption System
b. Data Encryption Standard
c. Data Encoding Standard
d. Data Encryption Signature
a. An organization that issues private keys and the corresponding algorithms
b. An organization that validates encryption processes
c. An organization that verifies encryption keys
d. An organization that issues certificates
a. Data Encoding Standard
b. Data Encoding Application
c. Data Encryption Algorithm
d. Digital Encryption Algorithm
a. Adi Shamir
b. Ross Anderson
c. Bruce Schneier
d. Martin Hellman
a. Key signing
b. Key escrow
c. Key clustering
d. Key exchange
a. 16
b. 32
c. 64
d. 56
a. It verifies the integrity and accuracy of the data.
b. It requires careful key management.
c. It does not require much system overhead in resources.
d. It requires keys to be escrowed.
a. Collision
b. Secure hashing
c. MAC
d. Key clustering
a. Time it takes to encrypt and decrypt the same plaintext
b. Time it takes to break the encryption
c. Time it takes to implement 16 rounds of computation
d. Time it takes to apply substitution functions
a. Minimizes the amount of primary and secondary storage needed to store passwords
b. Prevents anyone from reading passwords in plaintext
c. Avoids excessive processing required by an asymmetric algorithm
d. Prevents replay attacks
a. DES is symmetric while RSA is asymmetric
b. DES is asymmetric while RSA is symmetric
c. They are hashing algorithms, but RSA produces a 160-bit hashing value
d. DES creates public and private keys while RSA encrypts messages