What does the OCSP protocol provide?
A. Revoked certificates
B. Hashing
C. VPN connectivity
D. Encryption
You have been tasked with selecting a digital certificate standard for your company to use. Which one of the following was an international standard for the format and information contained in a digital certificate?
A. CA
B. X.509
C. CRL
D. RFC 2298
Which of the following is generally true about key sizes?
A. Larger key sizes increase security
B. Key size is irrelevant to security
C. Key sizes must be more than 256 bits to be secure
D. Smaller key sizes increase security
A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.
A. Kasiski Method
B. Birthday Attack
C. Information Deduction
D. Integral Cryptanalysis
Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.
A. Decoding
B. Substitution
C. Transposition
D. Collision
During the process of encryption and decryption, what keys are shared?
A. Public keys
B. Public and private keys
C. User passwords
D. Private keys
In a Feistel cipher, the two halves of the block are swapped in each round. What does this provide?
A. Diffusion
B. Confusion
C. Avalanche
D. Substitution
Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.
A. Key
B. IV
C. Chain
D. Salt
This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.
A. SHA-256
B. FORK-256
C. SHA-1
D. RSA
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
A. Vigenere's principle
B. Shamir's principle
C. Kerkchoff's principle
D. Babbage's principle
An attack that is particularly successful against block ciphers based on substitution- permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.
A. Differential Cryptanalysis
B. Linear Cryptanalysis
C. Chosen Plaintext Attack
D. Integral Cryptanalysis
A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?
A. SHA1
B. MD5
C. FORK
D. RIPEMD
Which one of the following uses three different keys, all of the same size?
A. 3DES
B. AES
C. RSA
D. DES
A disk you rotated to encrypt/decrypt. Created by Leon Alberti. Similar technologies were used in the Enigma machine. Considered the forefather of modern encryption.
A. Chi Square
B. Enigma Machine
C. Cipher Disks
D. Scytale Cipher