Cryptography 2
This is the encryption algorithm that will begin to supplant the Data Encryption Standard (DES) - and later Triple DES - over the next few years as the new standard encryption algorithm. a) Rijndael b) Kerberos c) Blowfish d) IPsec
A
Today, many Internet businesses and users take advantage of cryptography based on this approach. a) public key infrastructure b) output feedback c) Encrypting File System d) single signon
A
In password protection, this is a random string of data used to modify a password hash. a) sheepdip b) salt c) bypass d) dongle
B
This is the inclusion of a secret message in otherwise unencrypted text or images. a) masquerade b) steganography c) spoof d) eye-in-hand system
B
This is the name for the issuer of a PKI certificate. a) man in the middle b) certificate authority c) Resource Access Control Facility d) script kiddy
B
This is an encryption/decryption key known only to the party or parties that exchange secret messages. a) e-signature b) digital certificate c) private key d) security token
C
Developed by Philip R. Zimmermann, this is the most widely used privacy-ensuring program by individuals and is also used by many corporations. a) DSS b) OCSP c) Secure HTTP d) Pretty Good Privacy
D
This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa. a) footprinting b) hash function c) watermark d) Electronic Code Book
D
This is a trial and error method used to decode encrypted data through exhaustive effort rather than employing intellectual strategies. a) chaffing and winnowing b) cryptanalysis c) serendipity d) brute force cracking
D
This was commonly used in cryptography during World War II. a) tunneling b) personalization c) van Eck phreaking d) one-time pad
D