CRYPTOGRAPHY -
D334
A digital certificate contains the _____ key of the entity the certificate is
issued to. - ANSWERS-Public
WPA supported Temporal Key Integrity Protocol (TKIP), which used an
initialization vector (IV) value of _____ bits. - ANSWERS-48
LM Hash is used in many versions of Microsoft Windows operating
systems to store user passwords that are fewer than _____ characters in
length. - ANSWERS-15
With a group of 70 people in a room, there is a 99.9% chance two of
those people were born on the same day. This probability theory is used
as a brute force method in cryptography called _______. - ANSWERS-
Birthday Attack
_____ provides a cryptography method to give a verifiable method that a
data entity was created at a defined time. - ANSWERS-TSP (Time-
Stamp Protocol)
END OF
PAGE
1
, INTRODUCTION TO LATEST
CRYPTOGRAPHY -
D334
_____ is a public key method that is used in both encryption and digital
signing. It is used in many applications and uses discrete logarithms. -
ANSWERS-El Gamal
_____ is a method that involves generating a encryption key from a
piece of the identity of the recipient. - ANSWERS-Identity-based
Encryption (IBE)
Secure sockets layer (SSL) uses which symmetric stream cipher? -
ANSWERS-RC4
With the _____ block cipher mode, within the first stage (during
processing of the first block), the data block is XOR'd with the
encrypted version of the IV value. The output of the XOR function is
then fed into the second stage and encrypted. - ANSWERS-Cipher
Feedback (CFB)
The ___ block cipher mode facilitates parallel processing of data blocks.
- ANSWERS-Counter Mode (CTR)
END OF
PAGE
2
, INTRODUCTION TO LATEST
CRYPTOGRAPHY -
D334
_____ cryptography is better suited for real-time communications
implementations than ______ cryptography due to its relative faster
speed. - ANSWERS-Symmetric, Asymmetric
With NTLM, each of the characters in a password are converted into
_____. - ANSWERS-Unicode
XOR the following
0101110101010111
1001100000111010
------------------ - ANSWERS-1100010101101101
asymmetric key-based encryption
-typical methods - ANSWERS-RSA
DSA
El Gamal
Symmetric key-based encryption
END OF
PAGE
3
, INTRODUCTION TO LATEST
CRYPTOGRAPHY -
D334
-Typical Methods - ANSWERS-RC2- 40 bit key size 64 bit block
RC4- (Stream Cipher)- Used in SSL and WEP
RC5- (Variable Key size, 32, 64, or 128 bit block size)
AES- (128, 192 or 256 bit key size, 128 bit block size)
DES- (56 bit key size. 64 bit Block size)
3DES- (112 bit key size, 64 bit block size)
Block Encryption - ANSWERS-RC2(40 bit key size)
RC5(Variable block size)
IDEA
DES
3DES
AES (Rijndael)
Blowfish
twofish
stream encryption - ANSWERS-RC4
END OF
PAGE
4