Q: 11
Network of trusted certificate authority servers. Use asymmetric key pairs and combines software,
encryption and services to provide a means of protecting security of business communication and
transactions.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
An attack that is particularly successful against block ciphers based on substitution-permutation
networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities.
For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
What is a variation of DES that uses a technique called Key Whitening?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 ≤ Xi ≤ m.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
Symmetric algorithm. Designed by James Massey and Xuejia Lai. Operates on 64 bit blocks and has a
128 bit key. Consists of 8 identical transformations each round and an output transformation.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for
DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key
cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure
because it is difficult to factor a large integer composed of two or more large prime factors.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Which of the following is a protocol for exchanging keys?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
Which of the following equations is related to EC?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
You are explaining the details of the AES algorithm to cryptography students. You are discussing the
derivation of the round keys from the shared symmetric key. The portion of AES where round keys
are derived from the cipher key using Rijndael's key schedule is called what?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2