CIS 460 MIDTERM REVIEW Part 3: Basic Encryption and Cryptography

¡Supera tus tareas y exámenes ahora con Quizwiz!

True or false: Rivest-Shamir-Adleman, or RSA, is an algorithm used for symmetric key cryptography.

False

True of False: Private key encryption is the most secure transmission

False Private key encryption is the least secure transmission

True or False: Secure Hash Algorithm is less secure than MD5

False Secure Hash Algorithm is more secure than MD5

True or False: The five basic informations protections cryptography provides are Confidentiality, Privacy, Accountability, Integrity and Reliability.

False The five basic informations protections cryptography provides are Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation

Name the only advantage of a stream cipher

Fast if it is short

List the four types of Stream Ciphers

1. Substitution cipher 2. Homo-alpha substitution cipher 3. Transposition cipher 4. RC4

What are the two most strategic uses for encryption?

1. To secure info during transmission 2. To secure stored information /data​

List the three types of block ciphers

1. Data Encryption Standard (DES) 2. Triple Data Encryption Standard (3DES) 3. Advanced Encryption Standard (AES)​

Name the five types of software encryption techniques.

1. File and File System Cryptography 2. Protects Groups of Files 3. Pretty Good Privacy (PGP) 4. GNU Privacy Guard (GPG) 5. Whole Disk Encryption

What are the four secure hashing algorithm characteristics?

1. Fixed Length / Size Hash Code​ 2. Is Unique 3. Proves Original Hash Value 4. Secure

List the three ways hashing can be used for integrity checks.

1. Hashing used to establish message / data 2. Hashed Message Authentication Code 3. Verify file integrity after download​

What are the four reasons why we need cryptography?

1. Increased use of Internet, e-commerce, electronic communications ​ 2. Increasing miniaturization of hardware-based ​ encryption products​ 3. Increasing use of private & public key cryptography 4. Continued cracking/ breaching of increasingly secure Crypto algorithms​

List the five common hashing algorithms

1. Message Digest (MD) ​2. Secure Hash Algorithm (SHA) ​3. Whirlpool Hash​ 4. RIPE-MD Hash​ 5. Password Hashes​

List the four parts of Cryptography

1. Plaintext/Data 2. Encryption 3. Ciphertext 4. Decryption

Name the five encryption techniques.

1. Private Key 2. Public Key 3. Digital Envelope 4. Digital Signatures 5. Hashing Techniques

What are the four asymmetric algorithm types?

1. RSA​ 2. Elliptic curve cryptography (ECC) ​3. Quantum cryptography​ 4. N-TRUEncypt​​

Name one reason why block ciphers are more secure.

- (block) output is more random​ - Cipher set to original state after each block used​ - "Padding" cipher adds more complexity​

Name one disadvantage of a stream cipher?

- Consumes more processing power if plaintext is long​ - More prone to attack because (engine generating) stream cipher does not vary (only the plain text changes)​ - Attacker can identify stream + ID the Key to crack ​

What are the five types of hardware encryption techniques?

1.Cryptography can be embedded in hardware​ 2. USB device encryption, Encrypted flash drives​ 3. Hard disk drive encryption, ​ 4. Trusted Platform Module (TPM)​ 5. Hardware Security Module (HSM)​

What is RIPEMD?

2 different and independent parallel chains of computation​ that are combined at end of process​ ​

What is a whirlpool hash?

A 512-bit hash

What is the key difference between a cipher and a code?

A cipher is an algorithm where as a code is a specific type of cipher

What is encryption?

A specific process / algorithm used to​ create a "coded" message

What is a one-time pad?

A type of substitution cipher that is absolutely unbreakable. Uses a block of shift keys of size n, each chosen at random

If Bob wants to send a secure message to Alice using an asymmetric cryptographic algorithm, which key does he use to encrypt the message?

Alice's public key

Which One Of The Following Statements About Block And Stream Ciphers Is Correct? A. Stream ciphers commonly use Feistel networks. B. Block ciphers are faster than equivalent stream ciphers. C. Most modern ciphers are block ciphers. D. Block ciphers encrypt one byte at a time.

C. Most modern ciphers are block ciphers.

What is the key difference between cryptography and encryption?

Cryptography is a study whereas encryption is an algorithm/process.

What is cryptography?

Cryptography is the practice and study of techniques for securing information and communication mainly to protect the data from third parties that the data is not intended for.

What are hash tables?

Data structure ("array") use for rapid "hash value" lookup ​

List the two key differences between hash and encryption

Hashing: One-way function, and any size input to be hashed that yields the same fixed-length output Encryption: Reversible and different input yields approximately same size crypto

What are the weaknesses of One time pad?

Key needs to be same length as plaintext, and Key can never be reused else the xor of the plaintexts will be leaked

Salting defends against what kind of attacks?

Password attacks

What is the key difference between private and public keys?

Public Key is encryption, and has two keys Private keys is decryption and the right side of the crypto key is always the private key

Alexei was given a key to a substitution cipher. The key showed that the entire alphabet was rotated 13 steps. What type of cipher is this?

ROT13

An algorithm for digitally signing data with a private key such that anyone with possession of the corresponding public key can verify the signature.

RSA

A widely used, standardized cryptographic hash function.

SHA256

What is the difference between Steganography and Cryptography?

Steganography means covered writing. Cryptography means secret writing.

Draw a substitution cipher and draw a transposition

Substitution Cipher file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%201.14.31%20PM.png Transposition Cipher file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%201.14.45%20PM.png file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%201.16.43%20PM.png

What is the difference between substitution cipher and transposition cipher?

Substitution cipher is 1 input = 1 cipher Transposition cipher = rearranges characters but does not change them

What is padding?​

Taking original text /data that may not be the same assigned size of its original Block Cipher (e.g. 32,64,512 bit cipher block) and adding random bits ​to extend cipher (code) to fit larger Block size​.​

What is the main disadvantage of private key encryption?

The same key is used for encryption and decryption

TRUE or FALSE: If Alice has a message to send to Bob and she wants to encrypt the message using asymmetric cryptography so that no one other than Bob can read it, she does so by using Bob's public key.

True

True or False: Blowfish is a type of block cipher

True

True or False: One-time pad is considered the MOST secure cipher of all time.

True

What is a digital envelope?

Use private key to encode a msg, then use public key to carry the private key (more efficient than using public key for everything) combo of private key + public keys​ + "secret session key" (for digital envelope)​

In the DES algorithm the round key is __________ bit and the Round Input is ____________ bits. a) 48, 32 b) 64,32 c) 56, 24 d) 32, 32

a) 48, 32

Which of the following key lengths is not supported by AES? a) 64 bits. b) 128 bits. c) 192 bits. d) 256 bits

a) 64 bits.

What is the difference between DES and AES? a) AES uses larger keys and is therefore more secure than DES. b) AES is a block cipher while DES is a stream cipher. c) AES is experimental and largely untested while DES is still used by the NSA for encryption. d) AES must be applied three times in order to be as secure as DES.

a) AES uses larger keys and is therefore more secure than DES.

There is an addition of round key before the start of the AES round algorithms. a) True b) False

a) True

Message Digest 2 (MD2) takes plaintext of _________________ ​and creates a ______ bit hash. a. any length and 512 b. any length and 256 c. any length and 64 d. any length and 128​

any length and 128

Which of the following properties must a cryptographic hash function provide? Select three. a) Key revocation. b) Collision resistance. c) A deterministic mapping from input to output. d) One-to-one mapping of input to output. e) Difficulty of finding an input that matches a given hash. f) None of the above.

b) Collision resistance. c) A deterministic mapping from input to output. e) Difficulty of finding an input that matches a given hash.

In the DES algorithm the 64 bit key input is shortened to 56 bits by ignoring every 4th bit. a) True b) False

b) False

In the DES algorithm, although the key size is 64 bits only 48bits are used for the encryption procedure, the rest are parity bits. a) True b) False

b) False

If any change is made to any of original info / data , the hash code will _______________. a. no change b. change dramatically c. change slightly ​

b. change dramatically

Salted PW hashes words​ are _________________ in "common word" lists​. a. easily found b. not found ​

b. not found

What is the name of the method in which letters are rearranged to create the ciphertext? a. enigma b. transposition c. substitution d. one-time pad

b. transposition

What is the difference between stream ciphers and block ciphers? a) Stream ciphers use the same key for both encryption and decryption. Block ciphers use different keys. b) Stream ciphers use different keys for encryption and decryption. Block ciphers use the same key for both. c) Stream ciphers encrypt one bit at a time. Block ciphers encrypt an entire block at a time. d) Stream ciphers encrypt an entire block at a time. Block ciphers encrypt a single bit at a time.

c) Stream ciphers encrypt one bit at a time. Block ciphers encrypt an entire block at a time.

How long would a 10-bit message be after being encrypted by a stream cipher? a. 2 bits b. 5 bits c. 10 bits d. 20 bits

c. 10 bits

The Advanced Data Encryption Standard (AES) in an encryption technique of __________________. a. Symmetric b. Modulation c. Asymmetric d. Algorithmic

c. Asymmetric

A hash is a _______ way code. a. three b. two c. one d. four

c. one

What type of cipher encrypts plaintext one byte or one bit at a time? a. block b. elliptical c. stream d. enigma e. hash

c. stream

AES uses a ____________ bit block size and a key size of __________ bits. a) 128; 128 or 256 b) 64; 128 or 192 c) 256; 128, 192, or 256 d) 128; 128, 192, or 256

d) 128; 128, 192, or 256

The DES Algorithm Cipher System consists of ____________ rounds, (iterations) each with a round key. a) 12 b) 18 c) 9 d) 16

d) 16

Why is a one-time pad impractical for everyday cryptography? a) True random number generators (TRNGs) are not a standard part of most computational devices. b) A key stream for a one-time pad must be securely delivered to all communicating parties without being compromised. c) A key stream for a one-time pad can only be used once. d) All of the above.

d) All of the above

What is a widely used privacy-ensuring program by individuals and corporations? a. Digital Signature Standard b. Online Certificate Status Protocol c. Secure HTTP d. Pretty Good Privacy

d. Pretty Good Privacy

Draw the Cryptography, Encryption and Cipher Diagram

file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%2011.40.00%20AM.pdf

Draw the basic encryption-decryption process

file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%2011.51.53%20AM.png

Draw the symmetric encryption process

file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%2011.52.39%20AM.png

Draw the asymmetric process

file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%2011.56.02%20AM.png

Draw the process of digital envelope encryption

file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%2011.58.21%20AM.png

Draw the digital signature process in a diagram.

file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%2011.59.51%20AM.png

Draw the password to password hash process

file:///Users/admin/Desktop/Screen%20Shot%202021-10-03%20at%2012.37.35%20PM.png


Conjuntos de estudio relacionados

Chapter 8 Portable Fire Extinguishers

View Set

Management: Information Systems 410 CHS 9-12

View Set

Pronouns: Subjects, Direct Objects, Indirect Objects, Predicate Nominatives, and Objects of the Preposition.

View Set

Lesson 4: Understanding Capacitance and How it Affects a Circuit

View Set

Most Missed Volleyball questions - Referee

View Set