100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

ECES CERTIFIED ENCRYPTION SPECIALIST REVIEW

Beoordeling
-
Verkocht
-
Pagina's
8
Cijfer
A+
Geüpload op
09-11-2025
Geschreven in
2025/2026

ECES CERTIFIED ENCRYPTION SPECIALIST REVIEW

Instelling
ECES
Vak
ECES









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
ECES
Vak
ECES

Documentinformatie

Geüpload op
9 november 2025
Aantal pagina's
8
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

ECES CERTIFIED ENCRYPTION SPECIALIST REVIEW

What term below best describes an attack in which the attacker obtains ciphertext
corresponding to a set of plaintexts to use in an attempt to derive the key used? -
Answer -Chosen plaintext

Which attack is like a chosen-plaintext attack, except the attacker can obtain ciphertexts
encrypted under two different keys? - Answer -Related-key Attack

What is a known plaintext attack and uses a linear approximation to describe the
behavior of the block cipher and was invented by Mitsarue Matsui ? - Answer -Linear
Cryptanalysis

From the list below, what term describes a mechanism used to create number streams
with random properties? Examples include Lagged Fibonacci and Mersenne Twister. -
Answer -Pseudo-random number generator (PRNG)

What term from the list below best describes a number whose factors are 1 and itself? -
Answer -Prime

Which term from the list below represents the total number of possible values of keys in
a cryptographic algorithm or other security measure? - Answer -Key space

Which term from the list below represents the entire cryptographic operation i.e. the
algorithm, key, and key management functions? - Answer -Cryptosystem

Which cipher makes use of a 5x5 table containing a keyword or key phrase and
encrypts pairs of letters or digraphs? - Answer -Playfair

Which cipher entails using a rod of a certain length to create/encrypt a message, and
the requiring the message recipient to use an identical sized rod to read/decrypt the
message? - Answer -Scytale

What type of cryptanalysis involves the examination of differences in an input and how
that affects the resultant difference in output? - Answer -Differential cryptanalysis

Which WiFi encryption standard is based on 802.11i and uses AES with CCMP to
provide for enhanced confidentiality, integrity and authentication? - Answer -WPA-2

What are the two types of symmetric encryption? - Answer -Block and Stream

Which of the following is true of hash encryption? - Answer -Accepts a variable length
input and produces a fixed length output

Which of the following is NOT required for a hash? - Answer -Minimum key length

, Which of the following are required for a hash? - Answer -input can be any length and
output has a fixed length, is one-way and collision-free

Which software-based stream cipher uses a lagged Fibonacci generator? - Answer -
FISH

The Advanced Encryption Standard is a subset of which algorithm? - Answer -Rijndael

From the list below, which term is best described as random bits added to a password
hash to help with safeguarding passwords in storage? - Answer -Salt

From the list below, which term is best described as a fixed-size, random stream, that is
added to a block cipher to increase randomness? - Answer -Initialization Vector (IV)

The Feistel Network used in symmetric block encryption entails the splitting of a block of
plaintext prior to the application of respective encryption round and XOR functions.
Which cipher from the list below is an "unbalanced" Feistel cipher (i.e. blocks of
plaintext are split into unequal parts)? - Answer -Skipjack

Which term from the list below best describes a number that only shares the number 1
as a common factor with another? - Answer -Co-Prime

What symmetric cipher was developed for use in the clipper chip? - Answer -Skipjack

What trusted entity associated with certificate management is responsible for issuing,
revoking, and managing digital certificates? - Answer -Certificate Authority

What technique should be used in conjunction with substitution to break up letter/word
frequency and aid in combating frequency analysis attacks? - Answer -Transposition

According to Kerchoff's Principle, a cryptosystem will remain secure so long as which
component of it is not publicly known? - Answer -Key

What term below best describes an attack in which the attacker only has access to the
ciphertext of a message? - Answer -Ciphertext only

From the list below, what term best describes an arbitrary, random or pseudo-random
number used only once in cryptographic communication and is then discarded? -
Answer -Nonce

What is Kerckhoffs's principle? - Answer -Only the key needs to be secret, not the
actual algorithm.

If you are sending an encrypted message to a colleague using symmetric encryption, of
the choices below, which key would you use to encrypt the message, and which key

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
GEEKA YALA UNIVERSITY
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2003
Lid sinds
3 jaar
Aantal volgers
1445
Documenten
47704
Laatst verkocht
1 week geleden

3,8

342 beoordelingen

5
170
4
61
3
44
2
16
1
51

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen