InfoSec Quiz 7

¡Supera tus tareas y exámenes ahora con Quizwiz!

The principal attraction of ________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead. A. ECC B. MD5 C. Diffie-Hellman D. none of the above

A. ECC

________ attacks have several approaches, all equivalent in effort to factoring the product of two primes. A. Mathematical B. Brute-force C. Chosen ciphertext D. Timing

A. Mathematical

________ is the original message or data that is fed into the encryption process as input. A. Plaintext B. Encryption algorithm C. Decryption algorithm D. Ciphertext

A. Plaintext

_________ was the first published public-key algorithm. A. NIST B. Diffie-Hellman C. RC4 D. RSA

B. Diffie-Hellman

Which of the following would allow an attack that to know the (plaintext of) current message must be the same as one previously transmitted because their ciphtertexts are the same? A. CBC B. ECB C. CFB D. OFB

B. ECB

________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key. A. Session key B. Subkey C. Key distribution technique D. Ciphertext key

C. Key distribution technique

Which of the following feature can only be provided by public-key cryptography? A. Confidentiality protection B. Integrity protection C. Non-repudiation D. None of the above

C. Non-repudiation

________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number. A. Digital standards B. Mathematical attacks C. Ciphers D. Timing attacks

D. Timing attacks

Cryptographic systems are generically classified by _______. A. the type of operations used for transforming plaintext to ciphertext B. the number of keys used C. the way in which the plaintext is processed D. all of the above

D. all of the above

Each block of 64 plaintext bits is encoded independently using the same key? is a description of the CBC mode of operation.

False

Just like RSA can be used for signature as well as encryption, Digital Signature Standard can also be used for encryption.

False

Timing attacks are only applicable to RSA.

False

A brute-force approach involves trying every possible key until an intelligible translation of the ciphertext into plaintext is obtained.

True

A key exchange protocol is vulnerable to a man-in-the-middle attack if it does not authenticate the participants.

True

In general, public key based encryption is much slower than symmetric key based encryption.

True

Symmetric encryption is also referred to as secret-key or single-key encryption.

True

The Diffie-Hellman algorithm depends for its effectiveness on the difficulty of computing discrete logarithms.

True

The ciphertext-only attack is the easiest to defend against.

True

Using PKCS (public-key cryptography standard), when RSA encrypts the same message twice, different ciphertexts will be produced.

True

AES uses a Feistel structure.

False


Conjuntos de estudio relacionados

Anatomy & Physiology Bio 168 Chapter 3

View Set

Becoming a World Power, 1872-1917, American History Chapter 5 Lesson 1 and 2

View Set

Pollution Responder 5.0 Recommended Enforcement Actions *

View Set

Chapter 1: Evolution and the Foundations of Biology

View Set

CTU Intro to Marketing: What is Marketing?

View Set