Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century BC by greek poet Archilochus.
A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.
Which one of the following uses three different keys, all of the same size?
A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.
Jane is looking for an algorithm to ensure message integrity. Which of following would be an acceptable choice?
Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m.
Which of the following is not a key size used by AES?
Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.
Which of the following encryption algorithms relies on the inability to factor large prime numbers?
Denis is looking at an older system that uses DES encryption. A colleague has told him that DES is insecure due to a small key size. What is the key length used for DES?
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?
John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?
The reverse process from encoding - converting the encoded message back into its plaintext format.
A cipher is defined as what
Changes to one character in the plain text affect multiple characters in the cipher text, unlike in historical algorithms where each plain text character only affect one cipher text character.
The greatest weakness with symmetric algorithms is _____.
As a network administrator, you have implemented WPA2 encryption in your corporate wireless network. The WPA2's ________ integrity check mechanism provides security against a replay attack.
A _____ is a function is not reversible.
What is a salt?
Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.
The most common way steganography is accomplished is via which one of the following?
Fred is using an operating system that stores all passwords as an MD5 hash. What size is an MD5 message digest (hash)?
What must occur in order for a cipher to be considered ‘broken’?
In steganography, ________ is the data to be covertly communicated (in other words, it is the message you wish to hide).
Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.
This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
What size block does FORK256 use?