100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

ECES CERTIFIED ENCRYPTION SPECIALIST REVIEW

Puntuación
-
Vendido
-
Páginas
8
Grado
A+
Subido en
09-11-2025
Escrito en
2025/2026

ECES CERTIFIED ENCRYPTION SPECIALIST REVIEW

Institución
ECES
Grado
ECES









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ECES
Grado
ECES

Información del documento

Subido en
9 de noviembre de 2025
Número de páginas
8
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

ECES CERTIFIED ENCRYPTION SPECIALIST REVIEW

What term below best describes an attack in which the attacker obtains ciphertext
corresponding to a set of plaintexts to use in an attempt to derive the key used? -
Answer -Chosen plaintext

Which attack is like a chosen-plaintext attack, except the attacker can obtain ciphertexts
encrypted under two different keys? - Answer -Related-key Attack

What is a known plaintext attack and uses a linear approximation to describe the
behavior of the block cipher and was invented by Mitsarue Matsui ? - Answer -Linear
Cryptanalysis

From the list below, what term describes a mechanism used to create number streams
with random properties? Examples include Lagged Fibonacci and Mersenne Twister. -
Answer -Pseudo-random number generator (PRNG)

What term from the list below best describes a number whose factors are 1 and itself? -
Answer -Prime

Which term from the list below represents the total number of possible values of keys in
a cryptographic algorithm or other security measure? - Answer -Key space

Which term from the list below represents the entire cryptographic operation i.e. the
algorithm, key, and key management functions? - Answer -Cryptosystem

Which cipher makes use of a 5x5 table containing a keyword or key phrase and
encrypts pairs of letters or digraphs? - Answer -Playfair

Which cipher entails using a rod of a certain length to create/encrypt a message, and
the requiring the message recipient to use an identical sized rod to read/decrypt the
message? - Answer -Scytale

What type of cryptanalysis involves the examination of differences in an input and how
that affects the resultant difference in output? - Answer -Differential cryptanalysis

Which WiFi encryption standard is based on 802.11i and uses AES with CCMP to
provide for enhanced confidentiality, integrity and authentication? - Answer -WPA-2

What are the two types of symmetric encryption? - Answer -Block and Stream

Which of the following is true of hash encryption? - Answer -Accepts a variable length
input and produces a fixed length output

Which of the following is NOT required for a hash? - Answer -Minimum key length

, Which of the following are required for a hash? - Answer -input can be any length and
output has a fixed length, is one-way and collision-free

Which software-based stream cipher uses a lagged Fibonacci generator? - Answer -
FISH

The Advanced Encryption Standard is a subset of which algorithm? - Answer -Rijndael

From the list below, which term is best described as random bits added to a password
hash to help with safeguarding passwords in storage? - Answer -Salt

From the list below, which term is best described as a fixed-size, random stream, that is
added to a block cipher to increase randomness? - Answer -Initialization Vector (IV)

The Feistel Network used in symmetric block encryption entails the splitting of a block of
plaintext prior to the application of respective encryption round and XOR functions.
Which cipher from the list below is an "unbalanced" Feistel cipher (i.e. blocks of
plaintext are split into unequal parts)? - Answer -Skipjack

Which term from the list below best describes a number that only shares the number 1
as a common factor with another? - Answer -Co-Prime

What symmetric cipher was developed for use in the clipper chip? - Answer -Skipjack

What trusted entity associated with certificate management is responsible for issuing,
revoking, and managing digital certificates? - Answer -Certificate Authority

What technique should be used in conjunction with substitution to break up letter/word
frequency and aid in combating frequency analysis attacks? - Answer -Transposition

According to Kerchoff's Principle, a cryptosystem will remain secure so long as which
component of it is not publicly known? - Answer -Key

What term below best describes an attack in which the attacker only has access to the
ciphertext of a message? - Answer -Ciphertext only

From the list below, what term best describes an arbitrary, random or pseudo-random
number used only once in cryptographic communication and is then discarded? -
Answer -Nonce

What is Kerckhoffs's principle? - Answer -Only the key needs to be secret, not the
actual algorithm.

If you are sending an encrypted message to a colleague using symmetric encryption, of
the choices below, which key would you use to encrypt the message, and which key
$13.99
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
GEEKA YALA UNIVERSITY
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2003
Miembro desde
3 año
Número de seguidores
1445
Documentos
47671
Última venta
1 semana hace

3.8

342 reseñas

5
170
4
61
3
44
2
16
1
51

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes