Crypto Notes
In comparing symmetric encryption to asymmetric encryption, which would be best suited for real-time encryption solutions where fast conversion is needed?
(Symmetric )The major advantage that secret-key encryption has over public-key is that it is typically much faster to decrypt, and can thus be used where a fast conversion is required, such as in real-time encryption.
RC4 is an a symmetric block cipher commonly used with SSL and WEP. true or false
(false) RC4 is commonly used with SSL and WEP, but it is a symmetric stream cipher.
How many rounds does AES use?
10, 12, 14
MD4 produces a _____-bit hash value.
128
MD5 produces a hash value of ____ bits.
128
SHA-1 produces a ____-bit hash value.
160
Which of the choices below represent hash values SHA-2 is capable of producing? Select all that apply.
256, 384, 512
RC5 is capable of operating with blocks of varying sizes. Which block sizes from the list below can RC5 use? Select 3.
32, 64, 128
Which simple cipher method attempts to bolster complexity by adding additional alphabets to be used for the substitution rounds and can change its mapping depending on a variable keyword?
A polyalphabetic cipher is any cipher based on substitution, using multiple substitution alphabets. A polyalphabetic cipher can change its mapping depending on a variable keyword.
A pre-compiled list of hash values for possible passwords is called a ______ and is used in cracking efforts by attackers.
A pre-compiled list of hash values for possible passwords is called a rainbow table. Attackers can bounce such a list off of a target in a brute force attack until a match is made.
The aim of the ______ cipher is to scramble plaintext letters by writing a message in sequence across a number of rails.
A useful method of hiding the cipher method is to scramble the plaintext letters in some way, and where it is not possible for the human eye to spot a pattern. Someone who knows the method will then be able to quickly decode. One method which scrambles in a defined pattern is the rail fence cipher. With this the message is written in a sequence across a number of rails. For example, if we use three rails, with a message of 'WE ARE DISCOVERED. FLEE AT ONCE', we get: W . . . E . . . C . . . R . . . L . . . T . . . E . E . R . D . S . O . E . E . F . E . A . O . C . . . A . . . I . . . V . . . D . . . E . . . N . . and where we then read across the rails to give a cipher code of "WECRL TEERD SOEEF EAOCA IVDEN".
AES is capable of operating with keys of varying sizes. Which key sizes from the list below is AES capable of using?
AES (128, 192 or 256-bit key size, 128-bit block size).
Modulo-2 multiplication operations is equivalent to logical____________ operations.
AND
From the choices below, select the mechanisms that can be used to provide error detection in binary data to support the integrity pillar of the CIA triad. Select all that apply.
Along with keeping things secret, and in proving the identity of an entity, we also need to integrate integrity, where we can prove that something has not been changed. A simple method of doing this is to add a checksum, in order to detect errors in the binary digits. CRC (Cyclic Redundancy Check) is one of the most reliable error detection schemes and can detect up to 95.5% of all errors.
Select the methods from the list below that contribute to improving the performance of brute force analysis.
Along with the increasing power of computers, and parallel processing, another method of improving the performance of brute force analysis is to use supercomputers.
Tianhe-2 and Titan are examples of what?
Along with the increasing power of computers, and parallel processing, another method of improving the performance of brute force analysis is to use supercomputers. Three of the most powerful machines in the world are: • Tianhe-2 (MilkyWay-2): National Super Computer Center in Guangzhou, 3,120,000 cores, 1PB memory. Intel Xeon processors. 54,902.4 TFlop/s. Manufacturer: NUDT. • Titan: DOE/SC/Oak Ridge National Laboratory. 560,640 cores, 710,144 GB, 27,112.5 TFlop/s. Opteron 6274 processors. Manufacturer: Cray Inc. • BlueGene/Q: DOE/NNSA/LLNL, IBM Department of Energy's (DOE) National Nuclear Security Administration's (NNSA), 1 PB memory, 20,132.7 TFlop/s, 1,572,864 cores using Power BQC 16C processors. Manufacturer: IBM.
1 point ________ is a polyalphabetic cipher that employs an improved code over the scrambled alphabet approach, where a different mapping, based on a keyword, is used for each character of the cipher.
An improved code over the scrambled alphabet approach was developed by Vigen`ere, where a different mapping, based on a keyword, is used for each character of the cipher. This is known as a polyalphabetic cipher as it uses a number of cipher alphabets.
In __________ cryptography, two different keys are used, one key is used to encrypt the plaintext, and the other key is used to decrypt it back to plaintext
Asymmetric Encryption
______ is a hash generator option for passwords that uses salt to create a non-recurrent hash.
Bcrypt is a more powerful hash generator for passwords and uses salt to create a non-recurrent hash. It was designed by Niels Provos and David Mazieres, and is based on the Blowfish cipher.
Steve is shopping for a symmetric encryption solution with a minimum 128-bit key size. Of the choices below, which would meet his criteria? Select two.
Both IDEA and AES would meet Steve's needs. IDEA has a 128-bit key size, and AES has a variable key size of 128, 192, or 256 bits. DES has a key size of only 56 bits and Skipjack has a key size of 80 bits.
From the list below, select the block cipher mode that converts the block cipher into a self-synchronizing stream cipher?
CFB
Of the choices below, which employs 64-bit block sizes and a 56-bit key size?
Characteristics of DES include 64-bit block size and 64-bit key (but where only 56-bits were actually used for the key, as the other eight bits are used as parity bits), and 16 rounds.
An improvement over the ECB block cipher mode is to use ____ which entails incorporating an initialization vector for the first block, and then using the results from the previous block to encrypt the current block.
Cipher Block Chaining (CBC) uses the IV for the first block, and then the results from the previous block is used to encrypt the current block. The IV value is used in the first block, and must be passed from the sender to the receiver or it will not be possible to decrypt the first and, thus, the subsequent blocks.
What type of code aims to overcome the ease at which letter and symbol probability in ciphertext can be analyzed, by varying the number of codes mapped to each character?
Cipher codes can often be analyzed using the probability of the letters/ symbols in the ciphertext. A homophonic substitution code aims to overcomes this problem, as it varies the number of codes assigned to each character, and relates this to the probability of the characters. For example the character 'e' might have 12 codes assigned to it, but 'z' would only have one.
Shawn plans to employ the symmetric block cipher AES for his encryption needs, but is interested in having the speed of operation that stream-based ciphers offer. In selecting the block cipher mode for his AES implementation, which of the below options should he consider? Select all that apply.
Cipher feedback (CFB), Output feedback (OFB), and Counter (CTR) are the block cipher modes from the list that have capability to operate similar to how synchronous stream ciphers operate.
An instance where two different pieces of data are hashed separately, but both result in a single identical hash value is described by what term?
Collision
The birthday paradox concept is employed in the birthday attack on hashes in effort to identify a _____ of a given hash.
Collision
What method was developed to facilitate key exchange using a one-way function?
Diffie, Hellman and Merkle then created a method for key exchange using a one-way function, and which was named the Diffie-Hellman method.
Laura wants to increase the randomness and unpredictability of the cryptosystem she has in use at her organization. What is she trying to incorporate?
Entropy is the foundation upon which all cryptographic functions operate. Entropy, in cyber security, is a measure of the randomness or diversity of a data-generating function. A lack of good entropy can leave a cryptosystem vulnerable and unable to encrypt data securely.
______ is the standard for SHA-3, Permutation-Based Hash and Extendable-Output Functions, and provides revision to the Applicability Clause of the Secure Hash Standard.
FIPS 202 is the standard for SHA-3, Permutation-Based Hash and Extendable-Output Functions and provides revision to the Applicability Clause of FIPS 180-4, Secure Hash Standard.
FIPS 140-4 is the Secure Hash Standard. true or false
False ( FIPS 180-4 is the Secure Hash Standard.)
The major improvement NTLM provides over LM is the incorporation of salt to increase security of hashes. true or false
Fasle NT LAN Manager (NTLM) is used in more modern Microsoft Windows systems (Windows XP, Windows Visa, Windows 7 and Windows NT). Rather than using DES it relies on the MD4 hashing algorithm with a series of mathematical calculations. MD4 supports both upper and lower case letters, and does not split the passwords in chunks. Unfortunately, as with LM Hash, it does not use salt.
From the list below, which is used for performing full disk encryption?
FileVault is the name apple uses for their full disk encryption technology.
What cipher uses a 26-character key mapping and converts a plaintext input to fixed length chunks of Morse Code used to derive ciphertext letters?
Fractionated Morse Cipher uses a 26 character key mapping and converts a plaintext input to Morse code. It then converts this into fixed-length chunks of Morse code, which are then converted into ciphertext letters. In converting the plaintext to Morse code, it uses 'x's between characters and 'xx' between words.
_____ is the largest positive integer that divides into two numbers without a remainder.
GCD is known as the greatest common divisor, or greatest common factor (gcf), and is the largest positive integer that divides into two numbers without a remainder.
HMAC is used to verify the integrity and authentication of a message and involves hashing with ______ as well as with standard hash functions.
HMAC is a message authentication code (MAC) that can be used to verify the integrity and authentication of the message. It involves hashing the message with a secret key, and thus differs from standard hashing, which is purely a one-way function. As with any MAC, it can be used with a standard hash function, such as MD5 or SHA-1, and which results in methods such as HMAC-MD5 or HMAC-SHA-1.
Hashing involves creating a _____ function which cannot be ______.
Hashing involves creating a one-way function which cannot be reversed.
Select the block ciphers from the list below. Select all that apply.
IDEA blowfish RC5
What describes a cipher code mapping used only once and then discarded essentially making it uncrackable?
If we want an uncrackable cipher, we must use a one-time pad, and which is a cipher code mapping that is used only once.
TrueCrypt is a software program that creates an encrypted file on your computer and lets you access the encrypted file using a drive letter. What is used to generate the salted key used with TrueCrypt?
In TrueCrypt, which encrypts file systems, we use PBKDF2 to generate the key (with salt) and which will decrypt the header, and reveal the keys which have been used to encrypt the disk (using AES, 3DES or Twofish).
Given the two sets (Set A and Set B) of objects below, select the true statement from the list below that represents: A — {ball, frisbee, kite} B — {kite, racket, rope}
In set theory, the ∩ represents intersection, or objects that belong to both sets being compared. kite is the only object that intersects both sets.
With ___ block cipher mode operation, first the data blocks are XOR'd with the encrypted version of the initialization vector. Following that, the output of the first stage encryption is fed into the next stage, and encrypted, with the output being XOR'ed with the second block.
In the Output Feedback (OFB) method, the first stage takes the data blocks and X-OR's with the encrypted version of the IV value. The output of the first stage encryption is then feed into the next stage, and encrypted, with the output being X-OR'ed with the second block.
_____ won the NIST hash function competition, and is proposed as the SHA-3 standard.
Keccak won the NIST hash function competition, and is proposed as the SHA-3 standard.
Which symmetric block cipher uses a 112-bit key and 64-bit blocks?
Key attributes of 3DES include 64-bit blocks, 112-bit key size, and 48 rounds,
From the list below, which hash option is used in Microsoft Windows environments storing passwords that are fewer than 15 characters long?
LM Hash is used in many versions of MS Windows operating systems to store passwords that are fewer than 15 characters. It is a fairly weak security implementation and can be easily broken using standard dictionary lookups.
Scrambled alphabet cipher schemes are easy to implement, but also easy to break mainly via observation of what?
Letter or word frequency and patterns make cracking these types of schemes relatively simple by using frequency analysis.
Which computing architecture type stores the most significant byte in the lowest memory address?
Memories store data in bytes, and where each byte has a unique memory location. The order that the byte values are stored depends on the computer architecture type. With Big Endian, the most significant byte is stored in the lowest memory address.
Which computing architecture type stores the least significant byte in the lowest memory address?
Memories store data in bytes, and where each byte has a unique memory location. The order that the byte values are stored depends on the computer architecture type. With Little Endian, the least significant byte is stored in the lowest memory address.
1 point ______ is an encoding method that works by translating characters into sequences of dots and dashes.
Morse code is an encoding method, rather than a cipher, that works by translating characters into sequences of dots (.) and dashes (-). When transmitted as a sound pattern the dash lasts around three times longer than a dot, and with a longer delay between words as there is between letters. The code was designed so that each of the characters varies in length approximately with the occurrence of the letter in common English.
Joe is trying to find a hashing solution to use as a simple checker which does not consume much processing power. What would you recommend him look into?
Most of the hashing methods use complex cryptography methods, and which can be time-consuming, and especially focused at microprocessors which have good computing resources. Sometimes we just need a simple checker which does not consume much processing power.
ASCII utilizes 8-bit values and supports up to 65,536 characters.
On a computer system, code and data are represented as binary, but humans find it difficult to deal with binary formats, so other formats are used to represent binary values. Two typical formats used to represent characters are ASCII and UTF-16. With ASCII we have 8-bit values and it can thus supports up to 256 different characters. UTF-16 extends the characters to 16-bit values, and thus gives a total of 65,536 characters.
Since block ciphers operate using fixed sized blocks, instances where data involved does not fit perfectly in a given block occurs. This opens the door for attackers to analyze blocks for patterns which can ultimately lead to a compromise. What is a common method used with block ciphers to counter this?
One of the simplest methods is to just pad it with NULL characters (ASCII zero values) so that it fills the last block.
____ is a Key Derivation Function defined in RFC 2898 that generates a salted hash. It is often used to create an encryption key from a defined password, and where it is not possible to reverse the password from the hashed value.
PBKDF2 (Password-Based Key Derivation Function 2) is defined in RFC 2898 and generates a salted hash. Often this is used to create an encryption key from a defined password, and where it is not possible to reverse the password from the hashed value. It is used in TrueCrypt to generate the key required to read the header information of an encrypted drive, and which stores the encryption keys.
Variations of one time passwords are an improved method of generating a passcode by generating a different one each time based on an initial ____ or based on time.
Passwords which use a hashed value can be cracked as either with rainbow tables or brute force. An improved method of generating passcode is to generate a different one each time based on an initial seed value, or based on time.
A ______ is a value which only has factors of 1 and itself, and used in areas such as key exchange and in public key encryption.
Prime Number
From the list below, which choices are most in line with the the purpose of hashing. Select two.
Protects integrity
A ____ repeats a random number after a given time (periodic). They are fast and are also deterministic, and are useful in producing a repeatable set of random numbers.
Pseudo-Random Number Generators (PRNGs). This method repeats the random numbers after a given time (periodic). They are fast and are also deterministic, and are useful in producing a repeatable set of random numbers.
Which symmetric block cipher has a variable key size from 1-128 bits and 64-bit blocks?
RC2 has a block size of 64 bits and variable key size from 1-128 with 40 bits being being the minimum suggested for use.
Select the stream ciphers from the list below. Select all that apply.
RC4 chacha
From the list below, which term is best described as random bits added to a password hash to help with safeguarding passwords in storage?
Salt added to the hash helps increase the work factor of attackers using brute force attacks with rainbow tables. Adding salt helps create more non-recurrent hashes.
Salting the password protects an LDAP hash from an attack involving what?
Salting the password protects the LDAP hash from a rainbow table attack, but it is still open to brute force attacks. Some of the algorithms hash for a given number of interactions. The greater the number of iterations, the longer the hash will take to crack.
If you are sending an encrypted message to a colleague using secret-key (symmetric) cryptography, of the choices below, (1) which key would you use to encrypt the message, and (2) which key would your colleague use to decrypt the message?
Secret-key or Symmetric-key cryptography involves use of a single secret key to both encrypt and decrypt. SO the same key used to encrypt the data must be also be used to decrypt it.
Blowfish and Twofish are examples of what?
Symmetric Block Ciphers
With_____________ encryption, we use a single electronic key to encrypt the plaintext and the same key is then used to decrypt.
Symmetric Encryption
A major disadvantage associated with symmetric encryption centers around the need to do what?
Symmetric encryption uses a single secret key for both encryption and decryption. So one obstacle that exists is determining how to pass the key to between parties.
Jeff wants to implement a password generation solution within a controlled environment at his organization that limits the time the password is valid to 10 minutes for visiting contractors. What can Jeff use as a solution? Bcrypt
TOTP (Timed One Time Password) is a method used to generate single use passwords which are only valid for a certain time period. For example we could have a system which allowed to creation a new account for your mobile phone, but where the password was only valid for a short time.
Which type of random number generator would be the best choice if you were interested in avoiding repeating to reduce chances of a value being guessed?
TRNGs are non-deterministic and aperiodic, they do not repeat and as such are less predictable than PRNGs.
________ provides a cryptography method to give a verifiable method that a data entity was created at a defined time.
TSP (Time-Stamp Protocol) provides a cryptography method to give a verifiable method that a data entity was created at a defined time, and is defined in RFC 3161. It uses a Time Stamping Authority (TSA) that must be trusted for a source of time, and produce a unique time-stamp token, serial number and thumbprint for the data entity
Order the steps required to send a confidential, authenticated message that incorporates hashing to ensure integrity.
The 5 basic steps to send a confidential, authenticated message that incorporates hashing ensure integrity are as follows: Step 1: Sender produces a hash of the message and encrypts it using sender's private key Step 2: Sender packages up [original message + encrypted hash] and encrypts both with receiver's public key Step 3: Receiver decrypts packaged up [original message + encrypted hash] with receiver's private key Step 4: Receiver decrypts the encrypted hash with sender's public key Step 5: Receiver computes hash of the original message and compares to the now decrypted original hash to ensure they matches.
The ______ format addresses the problems of brute forcing an MD5 hash by incorporating salt, and basically iterates the hash value 1,000 times. This considerably slows an intruder as they try to crack the hashed value.
The Apache-defined APR1 format addresses the problems of brute forcing an MD5 hash, and basically iterates the hash value 1,000 times. This considerably slows an intruder as they try to crack the hashed value
Which cipher makes use of a grid which maps letters into numeric values as part of the encryption process?
The BIFID cipher uses a grid and was invented by Felix Delastelle in 1901. In its simplest form it creates a grid and which maps the letters into numeric values.
Which mono-alphabetic early cipher involved "shifting" a given number a positions down the alphabet to replace characters as part of the enciphering process? positions down the alphabet.
The Caesar Cipher was a mono-alphabetic substitution cipher known as a "shift" cipher. Its operation Involved plaintext being replaced by a letter some fixed number of positions down the alphabet. i.e., a Caesar Cipher using a shift of +3 would mean a plaintext letter A would result in a ciphertext letter D (a shift of three positions to the right in the alphabet).
What is the difference between OFB and CFB with regard to the output from a previous block fed into the cipher stage of the current block?
The OFB current block takes output from the cipher stage of the previous block while the CFB current block takes the output of the XOR process of the previous block.
When setting up the table for use with the Playfair cipher, you should ensure no letters are repeated and also be sure to omit which letter from the matrix?
The Playfair cipher was created by Charles Wheatstone, but was made famous by Lord Playfair. Initally a grid is created with a secret phrase. Next we write out the 5 5 matrix, but do not repeat characters (and get rid of 'J')
________ published the first successful attack against the Vigenère cipher in 1863.
The Vigenère method though, was cracked by Major Friedrich Wilhelm Kasiski, a German infantry officer. He was the first to propose a method of attacking polyalphabetic substitution ciphers, and, in 1863, published a 95-page book on cryptography: Die Geheimschriften und die Dechiffrir-Kunst "Secret writing and the Art of Deciphering".
From the list of symmetric block cipher modes below, which would facilitate parallel processing of blocks? Select all that apply.
The advantage of CTR operation is that each block is processed independent of the others, facilitating ability to conduct parallel processing of blocks. i.e. feedback from other stages to feed into the current one is not required. CBC, OFB, and CFB all require input from previous block stages to process the current block.
In comparing symmetric stream encryption to symmetric block encryption, which is faster and would be better suited for real-time applications?
The encryption method can either be applied by selecting blocks of a data, and then encrypting them, or it can operate on the data stream, where one bit at a time is encrypted. Overall stream encryption is often much faster, and can typically be applied in real-time applications.
The standard hash function works by taking a _______ input and producing a ______output.
The hash function works by taking an input of any length and and producing a fixed length output. The size of the output will be in line with the specific hash algorithm's characteristics.
An attack on passwords that involves knowing the mapping between hashed values and the original data is called a ________ .
The method of knowing the mapping between the hashed values and the original data is a rainbow table attack.
Modulus Operator Math. Solve the following: 12 (mod 5) =
The mod operator provides the remainder of an integer divide. For example for 31 divided by 8 gives the result of 3 remainder 7. Thus 31 (mod 8) equals 7.
A major problem in encryption is that the ciphertext can be played back where an intruder can copy an encrypted message and play it back, as the same plaintext will always give the same ciphertext. What can be added to the ciphering process help address this problem?
The solution to this is to add salt to the ciphering process, so that it changes its operation from block-to-block (for block encryption) or data frame-to-data frame (for stream encryption).
From the list below, select the three elements that directly relate to password strength and their susceptibility to cracking?
The strength of a password relates to three major elements: • The number of characters in the password. The more characters that are in the password the stronger the password is likely to be. • The range of characters in the password. The wider the range of characters in a password is likely to increase its strength, especially in using non-alphabet ones (such as "!", "@", and so on). • The cracking speed of a brute force generator. This relates to the speed of the cracker, such as 1,000,000 tries per second.
Output Feedback (OFB) creates a synchronous stream output. true or false
True
A ____________ generates a true random number, and uses some form of random process. One approach is to monitor the movements of a mouse pointer on a screen or from the pauses between keystrokes. Overall the method is generally slow, especially if it involves human interaction, but is non-deterministic and aperiodic.
True Random Number Generators (TRNGs). This method generates a true random number, and uses some form of random process. One approach is to monitor the movements of a mouse pointer on a screen or from the pauses between keystrokes. Overall the method is generally slow, especially if it involves human interaction, but is non-deterministic and aperiodic.
What are two hashing or encoding methods used for passwords in Cisco devices?
Type 5 = hashing with MD5; Type 7 = encoding method
In the Cisco environment, passwords hashed with the Type 5 method have a hash value of how many bits?
Type 5 employs MD5 which produces a 128-bit hash value.
Which cipher from the list below uses graphical characters such as symbols of some sort for mapping vs mapping to alphabetic characters?
Using a graphical method can make things easy to remember as the human eye often finds it easier to map letters of one alphabet to graphical characters than to map letters of an alphabet to alphabetic ones. The Pigpen cipher is a good example of this and uses a mono-alphabet substitution method.
The ____ cipher adds complexity to employing grids for enciphering text by using four 5 by 5 matrices arranged in a square where each matrix contains 25 letters.
We can make the grids more complex, such as with the four-square cipher. This method uses four 5 5 matrices arranged in a square, are where each matrix contains 25 letters. The upper-left and lower-right matrices are the "plaintext squares" and each contains a standard alphabet. The upper-right and lower-left squares are the "ciphertext squares" and have a mixture of characters.
Shawn and his colleague collaborate on a project and keep the project information secret within a file named "project1" encrypted with AES Crypt. The password is set to "1project". What command would be used to decrypt the file to view its contents?
When using Aescrypt, the command aescrypt -e filename is used for encryption, and the command aescrypt -d filename is used for decryption. AES Crypt is a file encryption software available on several operating systems that uses the industry standard Advanced Encryption Standard (AES) to easily and securely encrypt files.
Apply binary XOR to find the output string for the following: 10011011 11111110
With XOR, one but not both of the numbers you are XORing must be 1 for your answer to be 1.
In terms of probability, the events that make up the possible outcome of a coin toss would be considered what?
With a coin toss, the outcome can be either head or tails, but not both. This would be considered mutually exclusive. For mutually exclusive events: P(A and B) = 0, or the probability of the outcome being both is none.
Regarding block cipher mode methodology, with a ____ cipher, if we lose any part of the ciphertext, we could not rebuild the rest of the cipher stream as the current cipher block is based on a previous one, and these build together as a chain, so that subsequent blocks cannot be decrypted.
With a non-synchronizing cipher, if we lose any part of the ciphertext, we could not rebuild the rest of the cipher stream as the current cipher block is based on a previous one, and these build together as a chain, so that subsequent blocks cannot be decrypted. Self-synchronizing stream operation remedies this issue and protects against the loss of a single bit or byte.
Which simple cipher method entails creation of a single mapping from a given alphabet to a cipher alphabet?
With cipher methods we can use a mono-alphabetic code, where we create a single mapping from our alphabet to a cipher alphabet. This type of alphabet coding remains constant.
Within ASCII encoding, characters are mapped to what type of values? Select all that apply.
Within ASCII coding, we map printable characters, such as 'Binary', and 'Decimal', to decimal, binary and hexadecimal values:
Match the padding methods below with the appropriate descriptions.
do independent research on this
A______ is a random number that is only used once, and is generated by one party and sent using a secure handshaking process.
nonce
Hashed versions of passwords in Unix environments are stored in the _______ .
passwd file
Asymmetric key encryption makes use of two keys and symmetric key encryption makes use of a single key. true or false
true
The Counter (CTR) block cipher mode converts the block cipher into a stream cipher. true or false
true
A ___ attack on a hash can take advantage of similar content, or instances where part of the message has some significance to the original, and generates the same hash signature.
• Similar context. This is where part of the message has some significance to the original, and generates the same hash signature. This is defined as a Pre-image attack. • Full context. This is where an alternative message is created with the same hash signature, and has a direct relation to the original message. This is an extension to a Pre-image attack.