Quiz 2 - CECS 378

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

If speed is a concern, it is fully acceptable to use _______rather than SHA as the embedded hash function for HMAC.

MD5

All encryption algorithms are based on two general principles: substitution and _______.

transposition

3. The _________ is the encryption algorithm run in reverse. A. decryption algorithm B. ciphertext C. plaintext D. secret key

A. decryption algorithm

12. A ________ is a key used between entities for the purpose of distributing session keys. A. permanent key B. session key C. distribution key D. all of the above

A. permanent key

10. Although the _________ attack is a serious threat, there are simple countermeasures that can be used such as constant time calcs, random delays or blinding computations. A. timing B. chosen ciphertext C. mathematical D. none of the above

A. timing

The ________was issued as a federal information-processing standard and is intended to replace DES and 3DES with an algorithm that is more secure and efficient.

Advanced Encryption Standard (AES)

SHA-1 produces a hash value of __________ bits. A. 256 B. 160 C. 384 D. 180

B. 160

3. Issued as RFC 2104, __________ has been chosen as the mandatory-to-implement MAC for IP Security. A. RSA B. SHA-3 C. DSS D. HMAC

D. HMAC

4. The _________ scheme has reigned supreme as the most widely accepted and implemented approach to public-key encryption. A. SHA-1 B. HMAC C. MD5 D. RSA

D. RSA

15. The DSS makes use of the _________ and presents a new digital signature technique, the Digital Signature Algorithm (DSA). A. HMAC B. XOR C. RSA D. SHA-1

D. SHA-1

7. _________ are analogous to a burglar guessing a safe combination by observing how long it takes to turn the dial from number to number. A. Digital standards B. Mathematical attacks C. Ciphers D. Timing attacks

D. Timing attacks

The Secure Hash Algorithm (SHA) was developed by the ____________ and published as a federal information processing standard (FIPS 180) in 1993.

National Institute of Standards and Technology (NIST)

___ was designed in 1987 by Ron Rivest and is a variable key-size stream cipher with byte-oriented operations.

RC4

Perhaps the most widely used public-key algorithms are _________ and Diffie-Hellman

RSA

One of the first public-key schemes, ______ was developed in 1977 by Ron Rivest, Adi Shamir, and Len Adleman.

RSA,

One of the simplest hash functions is the ______________ of every block.

XOR (bit-by-bit exclusive-OR)

8. For general-purpose block-oriented transmission you would typically use _______ mode. A. CBC B. CTR C. CFB D. OFB

A. CBC

14. The principal attraction of __________ compared to RSA is that it appears to offer equal security for a far smaller bit size, thereby reducing processing overhead. A. ECC B. MD5 C. Diffie-Hellman D. none of the above

A. ECC

6. _________ attacks have several approaches, all equivalent in effort to factoring the product of two primes. A. Mathematical B. Brute-force C. Chosen ciphertext D. Timing

A. Mathematical

________ is the original message or data that is fed into the algorithm as input. A. Plaintext B. Encryption algorithm C. Decryption algorithm D. Ciphertext

A. Plaintext

2. In 2005, NIST announced the intention to phase out approval of _______ and move to a reliance on the other SHA versions by 2010. A. SHA-1 B. SHA-512 C. SHA-256 D. SHA-2

A. SHA-1

14. Public-key encryption was developed in the late ________. A. 1950s B. 1970s C. 1960s D. 1980s

B. 1970s

9. For general-purpose stream-oriented transmission you would typically use _______ mode. A. CTR B. CFB C. ECB D. CBC

B. CFB

11. ___________ was the first published public-key algorithm. A. NIST B. Diffie-Hellman C. RC4 D. RSA

B. Diffie-Hellman

4. If the analyst is able to get the source system to insert into the system a message chosen by the analyst, then a ________ attack is possible. A. known-plaintext B. chosen-plaintext C. chosen ciphertext D. chosen text

B. chosen-plaintext

6. There are _____ modes of operation defined by NIST that are intended to cover virtually all the possible applications of encryption for which a block cipher could be used. A. three B. five C. seven D. nine

B. five

8. The _________ attack exploits the common use of a modular exponentiation algorithm in RSA encryption and decryption but can be adapted to work with any implementation that does not run in fixed time. A. mathematical B. timing C. chosen ciphertext D. brute-force

B. timing

13. The __________ uses an algorithm that is designed to provide only the digital signature function and cannot be used for encryption or key exchange. A. ECC B. RSA C. DSS D. XOR

C. DSS

11. __________ is a term that refers to the means of delivering a key to two parties that wish to exchange data without allowing others to see the key. A. Session key B. Subkey C. Key distribution technique D. Ciphertext key

C. Key distribution technique

7. For stream-oriented transmission over noisy channel you would typically use _______ mode. A. ECB B. CTR C. OFB D. CBC

C. OFB

13. The _______ module performs end-to-end encryption and obtains session keys on behalf of users. A. PKM B. RCM C. SSM D. CCM

C. SSM

5. A ________ attack involves trying all possible private keys. A. mathematical B. timing C. brute-force D. chosen ciphertext

C. brute-force

9. A __________ type of attack exploits properties of the RSA algorithm. A. timing B. brute-force C. chosen ciphertext D. mathematical

C. chosen ciphertext

2. The exact substitutions and transformations performed by the algorithm depend on the ________. A. ciphertext B. decryption algorithm C. secret key D. encryption algorithm

C. secret key

______ has been issued as RFC 2014, has been chosen as the mandatory-to-implement MAC for IP Security, and is used in other Internet protocols, such as Transport Layer Security.

HMAC

__________ are alarming for two reasons: they come from a completely unexpected direction and they are a ciphertext-only attack.

Timing attacks

A ____ cipher processes the input one block of elements at a time, producing an output block for each input block.

block

An encryption scheme is _______ if the cost of breaking the cipher exceeds the value of the encrypted information and/or the time required to break the cipher exceeds the useful lifetime of the information.

computationally secure

The evaluation criteria for the new hash function are: security, ______, and algorithm and implementation characteristics.

cost

Unlike ECB and CBC modes, ______ mode requires only the implementation of the encryption algorithm and not the decryption algorithm.

counter (CTR)

The security of any MAC function based on an embedded hash function depends in some way on the _______ strength of the underlying hash function.

cryptographic

The most powerful, and most common, approach to countering the threats to network security is ________.

encryption

With ____ encryption the encryption process is carried out at the two end systems.

end-to-end

For symmetric encryption to work the two parties to an exchange must share the same ______, which must be protected from access by others.

key

With ____ encryption each vulnerable communications link is equipped on both ends with an encryption device.

link

Four possible approaches to attacking the RSA algorithm are: brute force, timing attacks, _______ attacks, and chosen ciphertext attacks

mathematical

A symmetric encryption scheme has five ingredients: plaintext, encryption algorithm, ciphertext, decryption algorithm and ______.

secret key

The purpose of the algorithm is to enable two users to exchange a _________ securely that can then be used for subsequent encryption of messages.

secret key

A ____ cipher processes the input elements continuously, producing output one element at a time as it goes along.

stream

"The input to the encryption algorithm is the XOR of the next 64 bits of plaintext and the preceding 64 bits of ciphertext" is a description of the _____ mode of operation.

Cipher Block Chaining (CBC) .

______is the process of attempting to discover the plaintext or key.

Cryptanalysis

10. ______ mode is typically used for a general-purpose block-oriented transmission and is useful for high-speed requirements. A. ECB B. OFB C. CFB D. CTR

D. CTR

5. The most widely used encryption scheme is based on the _________ adopted in 1977 by the National Bureau of Standards. A. AES B. 3DES C. CES D. DES

D. DES

12. The National Institute of Standards and Technology has published Federal Information Processing Standard FIPS PUB 186, known as the __________. A. XOR B. MD5 C. MAC D. DSS

D. DSS

15. Cryptographic systems are generically classified by _________. A. the type of operations used for transforming plaintext to ciphertext B. the number of keys used C. the way in which the plaintext is processed D. all the above

D. all the above

The three most important symmetric block ciphers are: 3DES, AES, and _________

Data Encryption Standard (DES).

The purpose of the _______ algorithm is to enable two users to exchange a secret key securely that can then be used for subsequent encryption of messages.

Diffie-Hellman

NIST has published FIPS PUB 186, which is known as the_____.

Digital Signature Standard (DSS)

Versions of SHA, with hash value lengths of 256, 384, and 512 bits, (SHA-256, SHA-384, and SHA 512) are collectively known as _____

SHA-2.

"Must support hash value lengths of 224, 256, 384, and 512 bits" and "algorithm must process small blocks at a time instead of requiring the entire message to be buffered in memory before processing it" are requirements for________.

SHA-3


Ensembles d'études connexes

Marketing 301 Chapter 12 Questions

View Set

Unit 10: Human Health and Air Pollution

View Set

Ch 43: Employment Discrimination

View Set