1/655
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
128
The hash value in bits for MD5 is ____.
A. 128
B. 160
C. 256
variable; fixed
Hashing involves taking a length input and producing a length output (message digest).
A. fixed; fixed
B. variable; fixed
C. fixed; variable
160
The hash value in bits for SHA-1 is ____.
A. 128
B. 160
C. 256
128
The hash value in bits for MD4 is ____.
A. 128
B. 160
C. 256
Transport
IPSec mode involves "end-to-end" encryption; i.e. data remains encrypted from the time it leaves a sender's device to the time it arrives at the receiver's device.
A. Tunnel
B. Transport
C. Trusted
Tunnel
IPSec mode involves encryption from gateway to gateway, i.e. just through the public network space.
A. Tunnel
B. Transport
C. Trusted
Tunnel
Remember, with tunnel mode, encryption does not happen until just before it leaves the local network. Traffic likely remains unencrypted between the end user device and the local network boundary.
A security analyst on a local network using monitoring tools is likely to only be able to read contents of traffic encrypted using IPSec mode.
A. Tunnel
B. Transport
C. Trusted
Chaskey
_ is a lightweight cryptography method for signing messages (MAC). It boasts a relatively undemanding hardware implementation (only ~3,333 gates required at 1MHz clock rate) making it suitable for IoT implementation.
128
Chaskey has a key size of _ bits.
A. 256
B. 128
C. 80
salt
A weakness of one-way hashing is that the same piece of plaintext will result in the same ciphertext unless _ is applied.
A. Salt
B. Ash
C. Ether
40
The minimum recommended key size to use with RC4 is _ bits.
A. 40
B. 20
C. 64
2048
RC4 is a symmetric stream cipher with a variable key size up to a max of _ bits.
A. 256
B. 2048
C. 1024
Data Encryption Standard (DES)
_ has a block size of 64 bits, key size of 56 bits, and 16 rounds of substitution & transposition.
A. DES
B. AES
C. RC4
rainbow table
A(n) _ is a collection of precomputed hash values of actual plaintext passwords used for password cracking.
A. initialization vector
B. key pair
C. rainbow table
.cer
_ is a common x.509 certificate file type that is used with both PEM and DER formats.
A. .crt
B. .cer
C. .der
Triple Data Encryption Standard (3DES)
_ has a block size of 64 bits, key size of 112 bits, and 48 rounds of substitution & transposition.
A. DES
B. RSA
C. 3DES
128, 192, 256
Key sizes used with the Advanced Encryption Standard (AES) include . , or _.
A. 10, 12, 14
B. 128, 192, 256
C. 32, 64, 80
128
The Advanced Encryption Standard (AES) operates using _ bit blocks.
A. 128
B. 192
C. 256
80
Skipjack is a symmetric block cipher that uses a bit key.
A. 64
B. 80
C. 112
128-bit key size; 64-bit IV
Enocoro operates with a key size of bits and an initialization vector (IV) of _ bits.
A. 80; 80
B. 128; 64
C. 80; 64
64
Skipjack has a block size of _bits.
A. 64
B. 80
C. 128
Light-weight hashing algorithms
PHOTON, SPONGENT, Lesamnta-LW, and Quark are examples of light-weight _.
A. hashing algorithms
B. public-key algorithms
C. symmetric block ciphers
IDEA
_ has a block size of 64 bits, key size of 128 bits, and >17 rounds of substitution & transposition.
A. RSA
B. DSA
C. IDEA
RSA
_ is a partially homomorphic crypto system that leverages prime number characteristics, operates with a 1024-4096 bit variable key size, and 1 round.
A. RSA
B. Diffie-Hellman
C. Chaskey
Symmetric Block
Blowfish and Twofish are both _ ciphers with common key sizes of 128, 192, or 256 bits.
A. symmetric block
B. symmetric stream
C. asymmetric
RC5
_ is a symmetric block cipher that uses block sizes of 32, 64, or 128 bits and boasts a variable key size up to 2048 bits.