WGU Course C839 - Intro to Cryptography Quizlet by Brian MacFarlane

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/292

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

293 Terms

1
New cards

What type of encryption uses different keys to encrypt and decrypt the message?

A Symmetric

B Private key

C Secure

D Asymmetric

D

2
New cards

The most widely used asymmetric encryption algorithm is what?

A RSA

B Vigenere

C DES

D Caesar Cipher

A

3
New cards

Original, unencrypted information is referred to as ____.

A text

B plaintext

C cleantext

D ciphertext

B

4
New cards

Which of the following is NOT an asymmetric system?

A PGP

B RSA

C SSL

D DES

D

5
New cards

In order for User A to send User B an encrypted message that only User B can read, User A must encrypt message with which of the following keys?

A User A's public key

B User A's private key

C User B's public key

D User B's private key

C

6
New cards

The greatest weakness with symmetric algorithms is _____.

A They are less secure than asymmetric

B The problem of key exchange

C They are slower than asymmetric

D The problem of generating keys

B

7
New cards

Which of the following is generally true about block sizes?

A Smaller block sizes increase security

B Block sizes must be more than 256 bits to be secure

C Block size is irrelevant to security

D Larger block sizes increase security

D

8
New cards

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

A Symmetric cipher

B Hash

C Asymmetric cipher

D Feistel

B

9
New cards

Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?

A Elliptic Curve

B RSA

C MD5

D Diffie-Hellman

D

10
New cards

A _________ is a digital representation of information that identifies you as a relevant entity by a trusted third party?

A Digital Signature

B Hash

C Ownership stamp

D Digest

A

11
New cards

What is the standard used by most digital certificates?

A X.509

B CRL

C RFC 2298

D OCSP

A

12
New cards

DES uses keys of what size?

A 56 bits

B 192 bits

C 128 bits

D 64 bits

A

13
New cards

Which of the following is NOT a key size used by AES?

A 512 bits

B 128 bits

C 192 bits

D 256 bits

A

14
New cards

Which of the following was a multi alphabet cipher widely used from the 16th century (1553) to the early 20th century (1900s)?

A Vigenere

B Caesar

C Atbash

D Scytale

A

15
New cards

Which of the following is a substitution cipher used by ancient Hebrew scholars?

A Caesar

B Vigenere

C Scytale

D Atbash

D

16
New cards

Shifting each letter in the alphabet a fixed number of spaces to the right or left is an example of what?

A Bit shifting

B Confusion

C Multi substitution

D Single substitution

D

17
New cards

Which of the following most accurately defines encryption?

A changing a message so it can only be easily read by the intended recipient

B Making binary changes to a message to conceal it

C changing a message using complex mathematics

D Applying keys to plain text

A

18
New cards

If you use substitution alone, what weakness is present in the resulting cipher text?

A It is the same length as the original text

B It is easily broken with modern computers.

C It is too simple.

D Because it maintains letter and word frequency.

D

19
New cards

_____ uses at least two different shifts, changing the shift with different letters in the plain text.

A Atbash

B multi-alphabet encryption

C Scytale

D Caesar cipher

B

20
New cards

____ was designed to provide built in cryptography for the clipper chip.

A Blowfish

B Skipjack

C GOST

D 3DES

B

21
New cards

Which of the following uses an 80 bit key on 64 bit blocks?

A Twofish

B AES

C Skipjack

D DES

C

22
New cards

With _____, the message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption.

A Electronic codebook (ECB)

B Cipher-block chaining (CBC)

C Cipher feedback (CFB)

D Output feedback (OFB)

A

23
New cards

Which of the following is an example of an unbalanced Feistel?

A 3DES

B Skipjack

C Twofish

D AES

B

24
New cards

This process is done by having each block of plaintext is XORed with the previous ciphertext block before being encrypted.

A Output feedback (OFB)

B Cipher-block chaining (CBC)

C Electronic codebook (ECB)

D Cipher feedback (CFB)

B

25
New cards

The process wherein the ciphertext block is encrypted then the ciphertext produced is XOR'd back with the plaintext to produce the current ciphertext block is called what?

A Output feedback (OFB)

B Cipher-block chaining (CBC)

C Cipher feedback (CFB)

D Electronic codebook (ECB)

C

26
New cards

This is a method for turning a block cipher into a stream cipher by generating a keystream block, which are then XORed with the plaintext blocks to get the ciphertext.

A Cipher feedback (CFB)

B Electronic codebook (ECB)

C Output feedback (OFB)

D Cipher-block chaining (CBC)

C

27
New cards

Which of the following modes can be used to turn a block cipher into a stream cipher?

A Propagating cipher-block chaining (PCBC) and Electronic codebook (ECB)

B Counter Mode (CTR) and Propagating cipher-block chaining (PCBC)

C Electronic codebook (ECB) and Output feedback (OFB)

D Output feedback (OFB) and Counter Mode (CTR)

D

28
New cards

A fixed-size pseudorandom number that is fed into a symmetric cipher to increase randomness is called what?

A IV

B Key

C Chain

D Salt

A

29
New cards

A number that is used only one time then discarded is called what?

A Nonce

B Chain

C Salt

D IV

A

30
New cards

Which of the following is a stream cipher that uses variable length key from 1 to 256 bytes?

A RC4

B AES

C DESx

D DES

A

31
New cards

This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.

A RC4

B Blowfish

C FISH

D Twofish

C

32
New cards

Which of the following is NOT required for a hash?

A Minimum key length of 256 bits

B Variable-length input, fixed-length output

C Non-reversible

D Few collisions

A

33
New cards

A ______ refers to a situation where two different inputs yield the same output.

A Substitution

B Convergence

C Collision

D Transposition

C

34
New cards

What is a salt?

A Key rotation

B Random bits intermixed with a hash to increase randomness and reduce collisions.

C Random bits intermixed with a symmetric cipher to increase randomness and make it more secure.

D Key whitening

B

35
New cards

RFC 1321 describes what hash?

A RIPEMD

B SHA1

C GOST

D MD5

D

36
New cards

What size block does FORK256 use?

A 256

B 128

C 512

D 64

C

37
New cards

In 1977 researchers at MIT described what asymmetric algorithm?

A RSA

B AES

C DH

D EC

A

38
New cards

What is the formula (M^e)(%n) related to?

A Encrypting with EC

B Generating Mersenne primes

C Decrypting with RSA

D Encrypting with RSA

C

39
New cards

Which of the following equations is related to EC?

A P = Cd%n

B Me%n

C y2 = x3 + Ax + B

D Let m = (p-1)(q-1)

C

40
New cards

U.S. Patent 5,231,668 and FIPS 186 define what algorithm?

A AES

B RSA

C Elliptic Curve (EC)

D Digital Signature Algorithm (DSA)

D

41
New cards

What is X.509?

A The standard for PGP certificates

B The standard for encrypting email

C The standard for FIPS 186

D The standard for digital certificates

D

42
New cards

What is contained in a CRL?

A Keys for RSA

B New certificates

C Revoked certificates

D Keys for AES

C

43
New cards

What does the Online Certificate Status Protocol (OCSP) provide?

A Revoked certificates

B Hashing

C VPN connectivity

D Encryption

A

44
New cards

In terms of cryptanalysis, what does it mean to break a cipher?

A finding a method to decrypt a message that is at least twice as efficient as brute force

B trying every possible key until you can decrypt the message

C deploying an algorithm that uses a 228 bit key

D finding any method to decrypt the message that is more efficient than brute force

D

45
New cards

An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.

A PAP

B CHAP

C SPAP

D EAP

B

46
New cards

What is a TGS?

A The server that grants Kerberos tickets

B protocol for encryption

C protocol for key exchange

D The server that escrows keys

A

47
New cards

What is Kerchoff's principle?

A A minimum key size of 256 bits is necessary for security.

B Both algorithm and key should be kept secret.

C A minimum of 15 rounds is needed for a Feistel cipher to be secure.

D Only the key needs to be secret, not the actual algorithm.

D

48
New cards

Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publically disclosed without damaging security?

A Babbage's principle

B Kerkchoff's principle

C Vigenere's principle

D Shamir's principle

B

49
New cards

A process that puts a message into the least significant bits of a binary file is called what?

A Symmetric cryptography

B Masking

C Steganography

D Asymmetric cryptography

C

50
New cards

If you wished to see a list of revoked certificates from a CA, where would you look?

A CRL

B CA

C RFC

D RA

A

51
New cards

Which of the following is generally true about block ciphers?

A Secret block ciphers should be trusted.

B Block ciphers permute the bits of the input plaintext.

C The plaintext and ciphertext are always the same size.

D A block cipher is an encryption function for variable-size blocks of data.

C

52
New cards

What does the OCSP protocol provide?

A encryption

B VPN connectivity

C hashing

D a real time protocol for verifying certificates

D

53
New cards

U.S. encryption standard that replaced DES. Block symmetric cipher that uses 128-bit block sizes and various key lengths (128, 192, 256).

AES

54
New cards

DES, 3DES, SHA, AES (some AES implementations are Type I)

Class 3 Algorithms

55
New cards

Encryption method where the sender and receiver use an instance of the same key for encryption and decryption purposes.

Symmetric

56
New cards

Block symmetric algorithm chosen by NIST as an encryption standard in 1976. It uses a 56-bit true key bit size, 64-bit block size, and 16 rounds of computation.

Data Encryption Standard (DES)

57
New cards

technical specification indicating how multimedia data and e-mail binary attachments are to be transferred.

Multipurpose Internet Mail Extensions (MIME)

58
New cards

Valid data transmission is maliciously or fraudulently repeated to allow an entity gain unauthorized access.

Replay Attack

59
New cards

protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.

Internet Protocol Security (IPSec)

60
New cards

Juniper (block cipher)

MAYFLY (asymmetric)

FASTHASH (hashing)

WALBURN (high bandwith link encryption)

PEGASUS (satellite telemetry)

Class 1 Algorithms

61
New cards

Component of a PKI that creates and maintains digital certificates throughout their life cycles.

Certificate Authority

62
New cards

Uses public key encryption and provides data encryption, server authentication, message integrity, and optional client authentication.

It is currently at version 3.0.

Secure Sockets Layer (SSL)

63
New cards

Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.

Social engineering attack

64
New cards

Cryptanalysis attack where the attacker is assumed to have access only to a set of ciphertexts.

Ciphertext-only attack

65
New cards

servers and software signing, for which independent verification and checking of identity and authority is done by issuing CA

Class 3 Certificates

66
New cards

it should be impossible for any attacker to calculate, or otherwise guess, from any given subsequence, any previous or future values in the sequence

BSI Criteria K3 states

67
New cards

Cryptanalysis attack that uses identified statistical patterns.

Statistical attack

68
New cards

organizations for which proof of identity is required

Class 2 Certificates

69
New cards

Block symmetric cipher that uses a 128-bit key and 64-bit block size.

International Data Encryption Algorithm (IDEA)

70
New cards

individuals, and intended for email

Class 1 Certificates

71
New cards

A form of cryptanalysis applicable to symmetric key algorithms that was invented by Eli Biham and Adi Shamir.

The examination of differences in an input and how that affects the resultant difference in the output.

Differential cryptanalysis

72
New cards

Cryptanalysis attack where the attacker is assumed to have access to sets of corresponding plaintext and ciphertext.

Known plaintext attack

73
New cards

Carries out real-time validation of a certificate and reports back to the user whether the certificate is valid, invalid, or unknown.

OCSP checks the CRL that is maintained by the CA.

Online Certificate Status Protocol (OCSP)

74
New cards

What is the formula Me%n related to?

Encrypting with RSA

75
New cards

Plain-text is equal to the encryption function (E) with the key (k) and the ciphertext (c) being passed as parameters to that function

P= E(k,c) Symmetric decryption

76
New cards

Not certified for government use

Class 4 algorithms

77
New cards

64 bit algorithm operating at 56 bits with an 8 bit parity block

DES

78
New cards

AH is the authenticating protocol, and ESP is an authenticating and encrypting protocol that uses cryptographic mechanisms to provide source authentication, confidentiality, and message integrity.

Authentication Header (AH) and Encapsulating Security Payload (ESP).

79
New cards

developed as a Russian national standard and produced fixed length outputs of 256 bits

GOST

80
New cards

A measure of the uncertainty associated with a random variable

Entropy

81
New cards

Attempts to make the statistical frequencies of the ciphertext and actual key as complex as possible

Confusion

82
New cards

Like AES, Serpent has a block size of 128 bits and can have a key size of 128, 192, or 256 bits. The algorithm is also a substitution-permutation network like AES. It uses 32 rounds working with a block of four 32-bit words. Each round applies one of eight 4-bit to 4-bit S-boxes 32 times in parallel. Designed by Ross Anderson, Eli Biham, and Lars Knudsen.

Serpent

83
New cards

What is the difference between Secure HTTP (SHTTP) and HTTP Secure (HTTPS)?

S-HTTP is a technology that protects each message sent between two computers, while HTTPS protects the communication channel between two computers, messages and all.

84
New cards

Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?

Vigenere

85
New cards

A _____ is a function that takes a variable-size input m and returns a fixed-size string.

Hash

86
New cards

A small change that yields large effects in the output.

Avalanche

87
New cards

Private organizations or governmental security

Class 5 Certificates

88
New cards

Numbers that have no factors in common with another.

Co-prime numbers

89
New cards

Cryptanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions.

Algebraic attack

90
New cards

Designed by Ross Anderson and Eli Biham in 1995. The size of a ________ hash value is 192 bits.

TIGER

91
New cards

In order for User A to send User B an encrypted message that only User B can read, User A must encrypt message with which of the following keys?

User B's public key

92
New cards

Public key algorithm that can be used for digital signatures, encryption, and key exchange.

an extension of the Diffie-Hellman algorithm.

El Gamal

93
New cards

Block symmetric cipher that was chosen to fulfill the Advanced Encryption Standard. It uses a 128-bit block size and various key lengths (128, 192, 256).

Rijndael

94
New cards

Published by Siemens in 1993. A software-based stream cipher

using a Lagged Fibonacci generator (pseudorandom number generator).

FISH

95
New cards

128 bit hash. RFC 1321

MD5

96
New cards

Cipher text (C) is equal to the encryption function (E) with the key (k) and plain-text (p) being passed as parameters to that function

C = E(k,p) Symmetric encryption

97
New cards

It is impossible to compress the data such that the code is less than the Shannon entropy of the source, without it being virtually certain that information will be lost

Shannon's source coding theorem

98
New cards

A non-secret binary vector used as the initializing input algorithm for

the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.

IV (Initialization Vector)

99
New cards

If a cryptanalysis uncovers a method that can derive a key for an algorithm, but is only slightly faster than brute force, what is this called?

Success

100
New cards

• Confidentiality

• Access control

• Integrity

• Authentication

• Nonrepudiation

PKI services