WITH FREQUENTLY TESTED QUESTIONS
and correct ANSWERS|ALREADY A
GRADED|GUARANTEED PASS|LATEST
UPDATE 2025.
Output Feedback (OFB) - CORRECT ANSWER- IV encrypted XOR Block 1 = Cipher 1, Cipher 1
encrypted XOR Block 2 = Cipher 2
Counter Mode (CTR) - CORRECT ANSWER- Nonce encrypted XOR Block 1 = Cipher 1, Nonce +1
encrypted XOR block 2 = Cipher 2
Rainbow Table - CORRECT ANSWER- A table of hash values and their corresponding plaintext
values that can be used to look up password values if an attacker is able to steal a system's
encrypted password file.
HMAC - CORRECT ANSWER- a fixed length string of bits similar to other hashing algorithms such as
MD5 and SHA-1, but it also uses a secret key to add some randomness to the result.
,Pigpen Cipher - CORRECT ANSWER- a geometric simple substitution cipher, which exchanges
letters for symbols which are fragments of a grid
Electronic Code Book (ECB) - CORRECT ANSWER- Block 1 encrypted = Cipher 1, Block 2 encrypted =
Cipher 2
Cipher Block Chaining (CBC) - CORRECT ANSWER- IV XOR Block 1 = Cipher text 1, Cipher Text 1 XOR
Block 2 = Cipher text 2.
Cipher Feedback (CFB) - CORRECT ANSWER- IV encrypted XOR Block 1 = Cipher 1, Cipher 1 XOR
Block 2 = Cipher 2
Rail Code - CORRECT ANSWER- scrambles text by writing it across rows and columns
bifid cipher - CORRECT ANSWER- maps letters in a grid to numeric values
Playfair Cipher - CORRECT ANSWER- Uses a 5x5 table and a key word. Rest of the alphabet is placed
on table in alphabetic order, skipping letters used in the keyword. You break up the message
into two character chunks and return a single character value. If the letters appear on the same
row of your table, replace them with the letters to the right. If it is on the same column, replace
them with the letters below.
Morse Code - CORRECT ANSWER- a system of dots and dashes that represent the alphabet
Ceasar Cipher - CORRECT ANSWER- a technique for encryption that shifts the alphabet by some
number of characters
Viginere Cipher - CORRECT ANSWER- using a series of different monoalphabet ciphers selected
based on the letters of a keyword. A polyalphabetic cipher.
, One-time pad - CORRECT ANSWER- an example of perfect (unbreakable) encryption, which is
achieved by using, only once, a random polyalphabetic key that is as long the message itself.
Four-Square Cipher - CORRECT ANSWER- four squares of alphabet are created and two characters
of plain text are mapped to two characters of cipher text
Enigma Machine - CORRECT ANSWER- An example of a one time pad encryption device.
Data Encryption Standard (DES) - CORRECT ANSWER- Symmetric, Block size: 64, Key size: 56,
Rounds: 16
Triple Data Encryption Standard (3DES) - CORRECT ANSWER- Symmetric, Block size: 64, Key size:
112, Rounds: 48
Advanced Encryption Standard (AES) - CORRECT ANSWER- Symmetric, Block size: 128, Key Size:
128,192,256, Rounds: 10, 12, 14
International Data Encryption Algorithm (IDEA) - CORRECT ANSWER- Symmetric, Block Size: 64, Key
Size: 128, Rounds: 17+
Skipjack - CORRECT ANSWER- Symmetric, Block Size: 64, Key Size: 80, Rounds: 32
Blowfish - CORRECT ANSWER- Symmetric, Block Size: 64, Key Size: 128, 192, 256, Rounds: 16
Twofish - CORRECT ANSWER- Symmetric, Block Size: 128, Key Size: 128, 192, 256, Rounds: 16