9.5 Symmetric Encryption

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Blowfish

A keyed symmetric block cipher that was intended to be free of the problems associated with other algorithms and replace DES.

What type of key or keys are used in symmetric cryptography?

A shared private key

You want to encrypt data on a removable storage device. Which encryption method would you choose to use the strongest method possible?

AES

Triple DES (3DES)

An enhanced version of DES.

Advanced encryption standard (AES)

An iterative symmetric-key block cipher that was developed as a replacement for DES in 2001.

Which of the following is considered an out-of-band distribution method for private key encryption?

Copying the key to a USB drive

Which of the following is the weakest symmetric encryption method?

DES

Which of the following symmetric cryptography systems does not support a variable block size?

IDEA

Which of the following symmetric block ciphers does NOT use a variable block length?

International Data Encryption Algorithm (IDEA)

How many keys are used with symmetric key cryptography?

One

Which of the following can be classified as a stream cipher?

RC4

Which of the following is the most frequently used symmetric key stream cipher?

Ron's Cipher v4 (RC4)

What form of cryptography is best suited for bulk encryption because it is so fast?

Symmetric key cryptography

Which of the following forms of cryptography is best implemented in hardware?

Symmetric stream

Stream cipher

A symmetric encryption that is performed on each bit within a stream of data in real time.

Block cipher

A symmetric encryption that transposes plaintext to ciphertext in chunks (block by block).

Data encryption standard (DES)

A very popular symmetric cryptography method created by the National Security Agency (NSA) that was one of the first symmetric encryption methods and is now obsolete due to known weaknesses.

Which of the following encryption mechanisms offers the least security because of weak keys?

DES

The sender's key is sent to a recipient using a Diffie-Hellman key exchange.

In-band distribution

The sender's key is sent to the recipient using public key cryptography.

In-band distribution

The sender's key is burned to a CD and handed to the recipient.

Out-of-band distribution

The sender's key is copied to a USB drive and handed to the recipient

Out-of-band distribution

Which version of the Rivest Cipher is a block cipher that supports variable bit length keys and variable bit block sizes?

RC5

Twofish

A symmetric block cipher that permits a wide variety of tradeoffs between speed, software size, key setup time, and memory.

Skipjack

A symmetric cryptography method created by the NSA that uses the Clipper chip (Very Large Scale Integration) device with an Advanced RISC Machine (ARM).

Ron's cipher v5 or Ron's code v5 (RC5)

A symmetric cryptography method that implements a symmetric-key block cipher cryptographic algorithm produced by RSA Security, Inc.

Ron's cipher v2 or Ron's code v2 (RC2)

A symmetric cryptography method that implements a variable-key-sized block cipher and was designed to replace DES.

International Data Encryption Algorithm (IDEA)

A symmetric cryptography method that is a minor revision of an earlier PES (Proposed Encryption Standard) that uses 64-bit blocks with 128-bit keys and is employed by Pretty Good Privacy (PGP) email encryption.

Which of the following are true of Triple DES (3DES)? (select two)

Uses a 168-bit key Is used in IPsec


Kaugnay na mga set ng pag-aaral

Econ Chapters 1-5 Multiple Choice Questions

View Set

Semester One Final Social Studies Lewis Cass

View Set

Communication with families and professional boundaries

View Set

Chapter 3: Stress and Illness/ Disease

View Set