Which of the following terms means a cryptography mechanism that hides secret communications within various forms of data?
- @ Steganography
) Cryptanalysis
) Ciphertext
) Algorithm
Which of the following algorithms are used in asymmetric encryption? (Select two.)
> RSA
. | Twofish
- | Diffie-Hellman
AES
. | Blowfish
b o
Mary wants to send a message to Sam in such a way that only Sam can read it.
Which key should be used to encrypt the message?
@ Mary's private key
() Mary's public key
() Sam's private key
— () Sam's public key
FPumlawmwadiawm
Above all else, what must be protected to maintain the security and benefit of an asymmetric cryptographic solution, especially if it is widely used for
digital certificates?
- () Private keys
@ Cryptographic algorithm
) Public keys
) Hash values
, Which of the following algorithms are used in symmetric encryption? (Select two.)
[] Ecc
Diffie-Hellman
->[] DES
RSA
->[] Blowfish
Which of the following encryption mechanisms offers the least security because of weak keys?
(O TwoFish
-> @ DES
() IDEA
() AES
There are several block cipher modes of operation that can be utilized depending on the application or use.
Which of the following block cipher modes of operation uses a nonce combined with a counter that is encrypted?
@ Cipher Block Chaining (CBC)
) Cipher Feedback Mode (CFB)
) Electronic Code Book (ECB)
- () Counter Mode (CTR)
bo
Which of the following types of encryption is specifically designed to allow data to be worked on without decrypting it first?
() Stream cipher
- @ Homomorphic encryption
Block cipher
Lightweight cryptography
, Step 1
~ User1 requests a transaction with User2.
Step 2
Fhe-blockisdistributed-t Yo P peerfetworkc The transaction is represented online
as a block.
Fhetransaction-isrepresented-ontine-asablock: The block is distributed to everyone on a peer-to-peer network.
Step 4
Fhebleckisaddedto-thechain: The network users verify the transaction is valid.
Step 5
Fhe-transaction-isrepresented-ontine-asableck: The block is distributed to everyone on a peer-to-peer network.
Step 4
Fhe-btockisadded-tothechain The network users verify the transaction is valid.
Step 5
Fhenetworkusers-verify-the-transaction-is-vatie: The block is added to the chain.
Step 6
~ The contents of the transaction move to User2.
Which of the following cryptographic attacks uses SSL exploitation as a common implementation of this attack?
Birthday attack
- () Downgrade attack
@ Dictionary attack
Collision attack