Term
RSA is a defacto used for |
|
Definition
1- Encryption
2- Digital signatures
3- Key exchange |
|
|
Term
What size is MD5 message digest (hash) |
|
Definition
|
|
Term
What does secure SHA-1 creates? |
|
Definition
1- Fixed length message
2- Digest from a variable length input message |
|
|
Term
what encryption do we use in PGP? |
|
Definition
|
|
Term
List IDEA's specifications |
|
Definition
1- Symmetric
2- 64 bit block
3- 8 rounds
4- 128 bit key
5- Block cipher
6- Used in PGP |
|
|
Term
Which is faster, IDEA or DES? |
|
Definition
|
|
Term
List Blowfish's specifications |
|
Definition
1- Symmetric
2- Block cipher
3- 64 bit block
4- Key anywhere between 32 to 448
5- Goes through 16 rounds |
|
|
Term
Which layer of OSI model provides non repudiation?
|
|
Definition
|
|
Term
IS DES symmetric or Asymmetric? |
|
Definition
|
|
Term
|
Definition
1- Encryption
2- Digital signature |
|
|
Term
Diffusion is carried out through... |
|
Definition
|
|
Term
Does RC4 provides hashing? |
|
Definition
|
|
Term
Which algorithm is vulnerable to man in the middle? |
|
Definition
|
|
Term
What is the maximum key size for RC5 algorithm? |
|
Definition
|
|
Term
What are the two types of Cryptography algorithms? |
|
Definition
|
|
Term
|
Definition
1- Created by Ron Rivest
2- Number of rounds up to 255
3- Symmetric
4- Block Cipher
5- Block size(s): 32,64 128
6- Keys goes up to 2048 bits |
|
|
Term
List the "One time Pad" specifications |
|
Definition
1- Made up of truly random values
2- Used only one time
3- Securly distributed to destination
4- secured at sender's and receive's site
5- At least as long as the message |
|
|
Term
|
Definition
when two keys generate the same cipher text from the same plain text |
|
|
Term
|
Definition
secret sequence of bits and instructions that governs the act of "Encryption" and "Decryption" |
|
|
Term
Hint: The only secrecy is the key... |
|
Definition
|
|
Term
The estimate of the effort and resources it would take an attacker to penetrate a cryptosystem? |
|
Definition
|
|
Term
what is cryptosystem made up of? |
|
Definition
1- Software
2- protocols
3- Algorithms
4- Key |
|
|
Term
what do we call the study of cryptography and cryptoanalysis? |
|
Definition
|
|
Term
Rijndale replaced what algorithm? |
|
Definition
|
|
Term
How many rounds does 3DES use? |
|
Definition
|
|
Term
What is the mode that is used when encrypting individual characters are required? |
|
Definition
Cipher Feed back mode
CFB |
|
|
Term
What DES, what mode do we use for ATM and PINS? |
|
Definition
ECB mode
Electronic Code Book mode |
|
|
Term
|
Definition
- Symmetric
- Block cipher algorithm
- 64 bit key
- 56 make up the true key
|
|
|
Term
What do we call the practice of breaking cryptic systems? |
|
Definition
|
|
Term
what should we use for 1 secure communication? |
|
Definition
|
|
Term
What algorithm uses Public and Private keys? |
|
Definition
Asymmetric
which some times is referred to by
Public Key Cryptography |
|
|
Term
Confusion is carried out through |
|
Definition
|
|
Term
What is Wasserar agreement? |
|
Definition
Intangibles can be downloaded from the internet |
|
|
Term
What cryptography algorithm provides "Authentication" and "non repudiation"? |
|
Definition
|
|
Term
What we call the DES mode that:
1- Functions like a stream
2- Cipher text is fed back to the algorithm to form a portion of the next input to encrypt the next stream of bit |
|
Definition
|
|
Term
How do we calculate the number of symmetric keys needed ? |
|
Definition
|
|
Term
Is IDEA symmetric or Asymmetric? |
|
Definition
|
|
Term
What is the formula of key Space? |
|
Definition
|
|
Term
What are the two types of Ciphers? |
|
Definition
Substitution and Transportaion |
|
|
Term
What algorithm did Rijndael replaced? |
|
Definition
|
|
Term
In which DES mode does each block of text, the key and the value, are based on previous block processed and applied to the next block? |
|
Definition
CBC
Cipher Block Chaining |
|
|
Term
Give an example about running key cipher? |
|
Definition
Book number, page number, line number, etc.. |
|
|
Term
Give an example about Concealment cipher? |
|
Definition
Message hidden within a message. For example: Key- every 3rd word |
|
|
Term
|
Definition
All possible values that can be sed to generate a key |
|
|
Term
When does Frequency analysis take place? |
|
Definition
when patterns in Ciphertext are identified and matched back to plain text. |
|
|
Term
what are the downfalls of symmetric algorithm ? |
|
Definition
1- Key distribution 2- Scalability 3- Limited security |
|
|
Term
Disadvantages of Asymmetric? |
|
Definition
1- Very slow 2- Size of encrypted limited by key length |
|
|
Term
If I encrypt data with my private key, who can decrypt it? |
|
Definition
any one who has my public key. |
|
|
Term
If I encrypt data with your private key, who can decrypt it? |
|
Definition
That shouldn't happen. Private key should be known by you only. |
|
|
Term
If I encrypt data with my public key, who can decrypt it? |
|
Definition
Only me, because I have the private key |
|
|
Term
If I encrypt data with my private key, what service does that provide? |
|
Definition
|
|
Term
why do we use asymmetric keys? |
|
Definition
To encrypt symmetric keys |
|
|
Term
What does Diffie-Hellman algorithm method allow? |
|
Definition
It allows key agreement to happen in a secure manner. |
|
|
Term
What algorithm replaces DES? |
|
Definition
|
|
Term
|
Definition
1- Block Cipher 2- Operates on 64 blocks data 3- Key length 128-bits 4- Uses 8 rounds of 16 bit sub blocks |
|
|
Term
|
Definition
|
|
Term
|
Definition
1- Variable key size up to 2040 2- Block Cipher 3- Variable Block size 32,64,128 4- Variable rounds up to 255 |
|
|
Term
When does MAC take place? |
|
Definition
When message and secret key are put together. |
|
|
Term
|
Definition
Message Authentication Code. |
|
|
Term
List the algorithms that can be used for Digital Signatures.. |
|
Definition
|
|
Term
|
Definition
Digital Signature Standard (DSS) — uses secure hash algorithm (SHA-1) and condenses message to 160 bits — Key size 512 to 1024 |
|
|
Term
If a symmetric key is encrypted with a receiver's public key, what security service is provided? |
|
Definition
|
|
Term
What is the difference between symmetric key and session key? |
|
Definition
Session key can be used ONE TIME only |
|
|
Term
|
Definition
It is symmetric block encryption algorithm. It uses 64 bit key: 56 make up the true key, and eight bits are used for parity DES goes through 16 rounds of transportation |
|
|
Term
How many rounds does 3DES go through? |
|
Definition
48 rounds. It is Triple DES, means 3xDES |
|
|
Term
How many keys does 3DES have? What are they? |
|
Definition
It has three keys: 1- 128-goes through 10 rounds....192 bits-goes through 12 rounds.... and 256 bits-goes through 14 rounds |
|
|
Term
What is Blow fish specs again? |
|
Definition
64 Bit Block symmetric algorithm It goes through 16 rounds key ranges between 32 up to 448 bits |
|
|
Term
Which Symmetric algorithm uses Stream Cipher? |
|
Definition
|
|
Term
A function that take a variable length and creates a fixed length value is called |
|
Definition
|
|
Term
The HAVAL algorithm creates what function? |
|
Definition
|
|
Term
The HAVAL algorithm, performs what function? |
|
Definition
|
|
Term
What does One-Way hash provides? |
|
Definition
|
|
Term
What does MD protect against? |
|
Definition
|
|
Term
|
Definition
Confidentiality, Integrity, and Authenticity. |
|
|
Term
What mail standard relied on Web trust? |
|
Definition
|
|