Module 9˸ Cryptography
Which encryption algorithm uses a method called block cipher and a variable key length from 32 to 448 bits?
Blowfish
Which type of cryptography attack is being performed when the cryptanalyst can choose different ciphertexts to be decrypted and has access to the decrypted plaintext?
Chosen-ciphertext attack
In an RSA attack using brute-force, which factoring algorithm if the fastest for numbers greater than 110?
General number field sieve
Which encryption-cracking tool displays a polite screensaver during the cracking process of the cipher and is designed to operate using idle machine time?
Idle CPU Time
Which message-digest algorithm does the program Pretty Good Privacy (PGP) use for computing message digests?
MD5
Which type of RSA attack is used in situations where a number of users share the n but they have a different e and d?
Modulus Attacks
Which encryption algorithm accepts a message of 264 bits in length and produces a 160-bit message-output digest?
SHA-1
What protocol is used to provide a secure authentication mechanism between two communicating applications, such as a client and a server?
SSL
What type of encryption method uses a key pair, one public key available to anyone, and one private key held only by the key owner?
asymmetric key system
When using a digital signature, what is the process called that is used to create a fingerprint of a message?
hash function