100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ECES CERTIFIED ENCRYPTION SPECIALIST REVIEW

Rating
-
Sold
-
Pages
8
Grade
A+
Uploaded on
09-11-2025
Written in
2025/2026

ECES CERTIFIED ENCRYPTION SPECIALIST REVIEW

Institution
ECES
Course
ECES









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ECES
Course
ECES

Document information

Uploaded on
November 9, 2025
Number of pages
8
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ECES CERTIFIED ENCRYPTION SPECIALIST REVIEW

What term below best describes an attack in which the attacker obtains ciphertext
corresponding to a set of plaintexts to use in an attempt to derive the key used? -
Answer -Chosen plaintext

Which attack is like a chosen-plaintext attack, except the attacker can obtain ciphertexts
encrypted under two different keys? - Answer -Related-key Attack

What is a known plaintext attack and uses a linear approximation to describe the
behavior of the block cipher and was invented by Mitsarue Matsui ? - Answer -Linear
Cryptanalysis

From the list below, what term describes a mechanism used to create number streams
with random properties? Examples include Lagged Fibonacci and Mersenne Twister. -
Answer -Pseudo-random number generator (PRNG)

What term from the list below best describes a number whose factors are 1 and itself? -
Answer -Prime

Which term from the list below represents the total number of possible values of keys in
a cryptographic algorithm or other security measure? - Answer -Key space

Which term from the list below represents the entire cryptographic operation i.e. the
algorithm, key, and key management functions? - Answer -Cryptosystem

Which cipher makes use of a 5x5 table containing a keyword or key phrase and
encrypts pairs of letters or digraphs? - Answer -Playfair

Which cipher entails using a rod of a certain length to create/encrypt a message, and
the requiring the message recipient to use an identical sized rod to read/decrypt the
message? - Answer -Scytale

What type of cryptanalysis involves the examination of differences in an input and how
that affects the resultant difference in output? - Answer -Differential cryptanalysis

Which WiFi encryption standard is based on 802.11i and uses AES with CCMP to
provide for enhanced confidentiality, integrity and authentication? - Answer -WPA-2

What are the two types of symmetric encryption? - Answer -Block and Stream

Which of the following is true of hash encryption? - Answer -Accepts a variable length
input and produces a fixed length output

Which of the following is NOT required for a hash? - Answer -Minimum key length

, Which of the following are required for a hash? - Answer -input can be any length and
output has a fixed length, is one-way and collision-free

Which software-based stream cipher uses a lagged Fibonacci generator? - Answer -
FISH

The Advanced Encryption Standard is a subset of which algorithm? - Answer -Rijndael

From the list below, which term is best described as random bits added to a password
hash to help with safeguarding passwords in storage? - Answer -Salt

From the list below, which term is best described as a fixed-size, random stream, that is
added to a block cipher to increase randomness? - Answer -Initialization Vector (IV)

The Feistel Network used in symmetric block encryption entails the splitting of a block of
plaintext prior to the application of respective encryption round and XOR functions.
Which cipher from the list below is an "unbalanced" Feistel cipher (i.e. blocks of
plaintext are split into unequal parts)? - Answer -Skipjack

Which term from the list below best describes a number that only shares the number 1
as a common factor with another? - Answer -Co-Prime

What symmetric cipher was developed for use in the clipper chip? - Answer -Skipjack

What trusted entity associated with certificate management is responsible for issuing,
revoking, and managing digital certificates? - Answer -Certificate Authority

What technique should be used in conjunction with substitution to break up letter/word
frequency and aid in combating frequency analysis attacks? - Answer -Transposition

According to Kerchoff's Principle, a cryptosystem will remain secure so long as which
component of it is not publicly known? - Answer -Key

What term below best describes an attack in which the attacker only has access to the
ciphertext of a message? - Answer -Ciphertext only

From the list below, what term best describes an arbitrary, random or pseudo-random
number used only once in cryptographic communication and is then discarded? -
Answer -Nonce

What is Kerckhoffs's principle? - Answer -Only the key needs to be secret, not the
actual algorithm.

If you are sending an encrypted message to a colleague using symmetric encryption, of
the choices below, which key would you use to encrypt the message, and which key

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
GEEKA YALA UNIVERSITY
View profile
Follow You need to be logged in order to follow users or courses
Sold
2003
Member since
3 year
Number of followers
1445
Documents
47683
Last sold
1 week ago

3.8

342 reviews

5
170
4
61
3
44
2
16
1
51

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions