Message hidden in unrelated text. Sender and receiver have pre-arranged to use a pattern to remove certain letters from the message which leaves only the true message behind.
Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186
Juanita has been assigned the task of selecting email encryption for the staff of the insurance company she works for. The various employees often use diverse email clients. Which of the following methods is available as an add-in for most email clients?
A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.
This is a proprietary version of PAP. Encrypts username and password as it is sent across network.
A technique used to increase the security of block ciphers. It consists of steps that combine the data with portions of the key (most commonly using a simple XOR) before the first round and after the last round of encryption.
If you wished to see a list of revoked certificates from a CA, where would you look?
Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?
A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.
Which of the following encryption algorithms relies on the inability to factor large prime numbers?
You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key. The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?
In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the ______ is intermixed with the message that is to be hashed
Bob’s password is hashed, and so is John’s. Even though they used different passwords, the hash is the same. What is this called?
The reverse process from encoding - converting the encoded message back into its plaintext format.
Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.
Basic information theory is the basis for modern symmetric ciphers. Understanding the terminology of information theory is, therefore, important. Changes to one character in the plaintext affect multiple characters in the ciphertext. What is this referred to?
A digital document that contains a public key and some information to allow your system to verify where that key came from. Used for web servers, Cisco Secure phones, E-Commerce.
The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.
Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
Which service in a PKI will vouch for the identity of an individual or company?
Represents the total number of possible values of keys in a cryptographic algorithm or other security measure, such as a password.
The most common way steganography is accomplished is via which one of the following?
A real time protocol for verifying certificates (and a newer method than CRL).
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Which one of the following is an authentication method that sends the username and password in cleartext?
What is the name of the attack where the attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing?
Which one of the following are characteristics of a hash function? (Choose two)
A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.
The next number is derived from adding together the prior two numbers (1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89).
You are explaining basic mathematics to beginning cryptography students. You are covering the basic math used in RSA. A prime number is defined as
Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?
_____ uses at least two different shifts, changing the shift with different letters in the plain text.
John is going to use RSA to encrypt a message to Joan. What key should he use?
John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)
A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement for DES. Like DES it is a 16 round Feistel working on 64bit blocks. Can have bit sizes 32bits to 448bits.
Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?