WGU C839 study
guide handout
with 100%
correct answers
DES Block Size - answer 64 bit
DES key size - answer 56 bits
DES Rounds - answer 16
DES Structure - answer Feistel
DES SYM/ASYM - answer Symmetric block
SHA256 - answer HASH VALUE 256
FORK256 - answer HASH VALUE 256
RIPEMD-160 - answer A message digest algorithm that produces a
160-bit hash.
, GOST - answer HASH VALUE 256
TIGER - answer HASH VALUE 192
AES Block Size - answer 128 bits
AES key size - answer 128, 192, or 256 bit key
AES Rounds - answer 10, 12, or 14 rounds
AES SYM/ASYM - answer Symmetric block
AES structure - answer Substition-permutation matrix
Diffie-Hellman - answer A key exchange algorithm used to privately
share a symmetric key between two parties.
Menezes-Qu-Vanstone (MQV) - answer A protocol used for key
agreement that is based on Diffie-Hellman. It is incorporated in the
public key standard IEEE P1363.
Key Exchange Algorithm (KEA) - answer A method of offering mutual
authentication and establishing data encryption keys.
Elliptic Curve Cryptography (ECC) - answer An algorithm that uses
elliptic curves instead of prime numbers to compute keys.
Blowfish SYM/ASYM - answer Symmetric block
guide handout
with 100%
correct answers
DES Block Size - answer 64 bit
DES key size - answer 56 bits
DES Rounds - answer 16
DES Structure - answer Feistel
DES SYM/ASYM - answer Symmetric block
SHA256 - answer HASH VALUE 256
FORK256 - answer HASH VALUE 256
RIPEMD-160 - answer A message digest algorithm that produces a
160-bit hash.
, GOST - answer HASH VALUE 256
TIGER - answer HASH VALUE 192
AES Block Size - answer 128 bits
AES key size - answer 128, 192, or 256 bit key
AES Rounds - answer 10, 12, or 14 rounds
AES SYM/ASYM - answer Symmetric block
AES structure - answer Substition-permutation matrix
Diffie-Hellman - answer A key exchange algorithm used to privately
share a symmetric key between two parties.
Menezes-Qu-Vanstone (MQV) - answer A protocol used for key
agreement that is based on Diffie-Hellman. It is incorporated in the
public key standard IEEE P1363.
Key Exchange Algorithm (KEA) - answer A method of offering mutual
authentication and establishing data encryption keys.
Elliptic Curve Cryptography (ECC) - answer An algorithm that uses
elliptic curves instead of prime numbers to compute keys.
Blowfish SYM/ASYM - answer Symmetric block