Adv. Computer Security Ch 6
XOR
Which binary mathematical operation can be used for a simple encryption method?
Caesar cipher
Which is a very early encryption method?
the underlying letter and word frequency can still be determined
Many encryption techniques such as XOR are easily broken because:
56bit
What size key does this system use?
brute force
Attempting to determine a password by simply trying every possible combination within the set parameters until successful is called:
PGP
Which encryption method is most widely available as an add-in for various applications, including email clients?
XOR ASCII with a key
Which is NOT a part of a step in the XOR operation of encryption method.
Transferring keys would be immune to interference with subatomic particles.
Which is NOT a way in which quantum physics might improve encryption in the future?
ASCII
Which is NOT an encryption method?
John the Ripper
Which is a powerful password cracker that works on Windows and Linux platforms?
RSA
Which is a public key encryption standard developed by three mathematicians in 1977 that provides very high but slow security?
Blowfish
Which is a symmetric block cipher developed in 1993 that provides variable-length key sizes ranging from 32 to 448 bits?
IDEA
Which is a very complicated block cipher using 128-bit keys to generate sub-keys to be applied to multiple blocks at the same time?
It uses two different keys.
Which is true about public key encryption?
DES
Which of the following is a symmetric key system using blocks?
Speed of the algorithm
If you are using a block cipher to encrypt large amounts of data, which of the following would be the most important consideration when deciding which cipher to use (assuming all of your possible choices are well known and secure):
NOT
Operations not found in normal math that can be performed on binary numbers include all of the following EXCEPT:
It is relatively fast
What is the primary advantage of the encryption algorithm described as a symmetric key system using blocks?
To validate the sender of a digital signature or software
What is the purpose of a certificate?
Public key
What type of encryption uses a different key to encrypt the message than it uses to decrypt the message?
ADEA
Which encryption algorithm uses a variable length symmetric key?
Testing the encryption of your own network
Which of the following is the most common legitimate use for a password cracker?
Caesar cipher
Which of the following is the oldest known encryption method?
It does not disrupt letter frequency.
Which of the following is the primary weakness in the Caesar cipher?
IDEA
Which of the following uses a total of 52 16-bit sub-keys?
Computer and Internet communications
Which type of encrypted communication is most common?
A private certificate authority
Who issues certificates?
No matter how secure your network is, the data being transmitted is still vulnerable without encryption.
Why is encryption an important part of security?
It does not change letter or word frequency
Why is the binary mathematical operation that is used for simple encryption not secure?
Multi-alphabet substitution
An improvement on the Caesar cipher that uses more than one shift is called a what?