Cipher Types Quiz
44 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main purpose of padding in cryptography?

  • To make ciphertext easily readable
  • To secure the key used for encryption
  • To ensure plaintext fits into fixed-size blocks (correct)
  • To enhance the speed of encryption
  • How does 3DES differ from DES in terms of key usage?

  • 3DES applies the DES algorithm three times with two keys (correct)
  • 3DES has a larger key size but uses fewer rounds
  • 3DES uses a single key, while DES uses multiple keys
  • 3DES operates with a different block size than DES
  • Which encryption standard has a block size of 128 bits?

  • IDEA
  • Twofish (correct)
  • RC5
  • Blowfish
  • What is the key size range for the RC2 encryption algorithm?

    <p>40 to 128 bits</p> Signup and view all the answers

    What does the term entropy refer to in cryptography?

    <p>The randomness in a cryptographic key</p> Signup and view all the answers

    What type of security issue does a hash collision represent?

    <p>Two inputs producing the same hash value</p> Signup and view all the answers

    Which of the following statements correctly describes AES?

    <p>AES uses a block size of 128 bits with key sizes of 128, 192, or 256 bits</p> Signup and view all the answers

    What is the main function of hashing in encryption?

    <p>To ensure data integrity</p> Signup and view all the answers

    What is the primary function of PKCS#10?

    <p>Request digital certificates from a Certificate Authority</p> Signup and view all the answers

    Which of the following is NOT a type of authentication?

    <p>Something You Think</p> Signup and view all the answers

    Which of the following describes the function of ESP in networking?

    <p>Encrypts the packet and provides integrity with authenticity</p> Signup and view all the answers

    What is the role of a Certificate Authority (CA) in PKI?

    <p>To issue and verify digital certificates</p> Signup and view all the answers

    Which of the following best describes 'Nobus Backdoor'?

    <p>A way for government to securely decrypt information for its own usage</p> Signup and view all the answers

    Which of the following does NOT belong to the main information fields of a digital certificate?

    <p>Encryption Algorithm</p> Signup and view all the answers

    What does the 'Hold' status mean in key/certificate management?

    <p>The certificate trust status can be reversed</p> Signup and view all the answers

    What is the purpose of the CRL (Certificate Revocation List)?

    <p>To list certificates that have been suspended or revoked</p> Signup and view all the answers

    What is the primary purpose of adding a salt to a password before hashing?

    <p>To prevent identical passwords from producing the same hashed value</p> Signup and view all the answers

    Which hashing algorithm is specifically designed to generate secure password hashes?

    <p>Bcrypt</p> Signup and view all the answers

    What type of attack is a Birthday Attack based on?

    <p>Hash collision probabilities</p> Signup and view all the answers

    What is the main objective of PBKDF2?

    <p>To salt and hash passwords multiple times for added security</p> Signup and view all the answers

    What is a significant issue with storing salts alongside hashed passwords?

    <p>Salts could be used to uncover hashed values more easily.</p> Signup and view all the answers

    What role does an IV (Initialization Vector) play in CBC-MAC?

    <p>To add randomness ensuring different ciphertexts for identical plaintexts</p> Signup and view all the answers

    Which of the following is true about Public Key Infrastructure (PKI)?

    <p>It involves centralized management of user credentials.</p> Signup and view all the answers

    What is a characteristic of WEP in terms of its security features?

    <p>It operates with a 24-bit Initialization Vector (IV).</p> Signup and view all the answers

    Which statement correctly differentiates between WPA and WPA2?

    <p>WPA2 supports AES-CCMP encryption.</p> Signup and view all the answers

    In the context of cryptocurrency, what is the role of Ethereum?

    <p>It measures the computational effort needed for hashing.</p> Signup and view all the answers

    What defines an active attack in cybersecurity?

    <p>The attacker modifies or inserts messages into the network.</p> Signup and view all the answers

    What is a feature of ChaCha20 as a stream cipher?

    <p>It has 20 transformation rounds.</p> Signup and view all the answers

    Which statement correctly describes the Little Endian byte order?

    <p>Least Significant byte is stored in the lowest memory address.</p> Signup and view all the answers

    What type of number can be both positive and negative without a fractional part?

    <p>Integers</p> Signup and view all the answers

    What is the result of the operation 17 mod 5?

    <p>2</p> Signup and view all the answers

    Which type of cipher consistently uses a single substitution for each letter?

    <p>Monoalphabetic Cipher</p> Signup and view all the answers

    What distinguishes a True Random Number Generator (TRNG) from a Pseudo-Random Number Generator (PRNG)?

    <p>TRNG generates true random numbers from physical processes.</p> Signup and view all the answers

    Which encryption method uses one key for both encryption and decryption?

    <p>Symmetric Encryption</p> Signup and view all the answers

    What feature does Perfect Forward Secrecy provide in encryption?

    <p>It provides a new session key for each communication.</p> Signup and view all the answers

    In the context of electronic encryption, what does ECB stand for?

    <p>Electronic Code Book</p> Signup and view all the answers

    What is a significant limitation of the Electronic Codebook (ECB) mode of encryption?

    <p>It is vulnerable to Copy and Paste attacks due to identical plaintext blocks generating identical ciphertext.</p> Signup and view all the answers

    Which cipher mode utilizes an initialization vector (IV) and enhances security over ECB?

    <p>Cipher Block Chaining (CBC)</p> Signup and view all the answers

    In which mode of encryption is each block processed independently, allowing for parallel processing?

    <p>Counter mode (CTR)</p> Signup and view all the answers

    Which of the following statements correctly describes stream encryption?

    <p>It operates by encrypting one bit at a time.</p> Signup and view all the answers

    What is the primary function of the IV in encryption algorithms?

    <p>To provide randomness to encryption processes across blocks or frames.</p> Signup and view all the answers

    Which of the following ciphers uses a substitution box (S-Box) in its encryption process?

    <p>AES</p> Signup and view all the answers

    Which encryption mode is characterized by converting a block cipher into a synchronous stream output?

    <p>Output Feedback (OFB)</p> Signup and view all the answers

    What is the purpose of using a nonce in the Counter mode (CTR)?

    <p>To generate a unique value that is never reused for encryption.</p> Signup and view all the answers

    Study Notes

    Cipher Types

    • Bifid Cipher: A grid matching letters to numerical values. More complex versions use 5x5 matrices.
    • Playfair Cipher: A 5x5 grid using a secret phrase. Letters cannot repeat in the grid, J is substituted with I.
    • Homophonic Substitution Cipher: Replaces plaintext with multiple possible ciphertexts.
    • Caesar Coding: Shifts each letter 3 places in the alphabet.
    • Scrambled Alphabet Cipher: Randomly maps alphabet letters. Cracked using frequency analysis.
    • Vigenère Cipher: Uses multiple cipher alphabets. Commonly uses a code word. Cracked via Kasiski examination.
    • Morse Code: Translates characters into dots and dashes using electronic current pulses.
    • Fractionated Morse Cipher: Provides an extra layer of encryption to standard Morse Code with a key mapping.
    • Pig Pen Cipher: A mono-alphabetic substitution method using a grid pattern.
    • Rail Fence Cipher: A method where the message is written in a sequence across a number of rails.
    • Combinations: Selects items from a larger set without considering order.
    • Permutations: Arranges objects in a specific order.
    • One-Time Pad (OTP): A nearly uncrackable cipher using a unique codebook.

    Data and Information

    • Data: Computers store data as binary (1s and 0s). ASCII supports 256 characters. UTF-16 extends characters to 65,536 values.
    • Hexadecimal: Splits a bit stream into groups of four bits (0-15).
    • Date Integrity: CRC (Cyclic Redundancy Check) verifies data reliability up to 95.5% accuracy. CRC-32 is a common method.
    • Reed Solomon: A data integrity scheme that not only detects but also corrects errors.
    • Huffman Coding: Compresses data by identifying common patterns in binary data or metadata.
    • Lempel-Ziv Welsh (LZW): An adaptive dictionary-based compression technique.
    • Little Endian: Stores the least significant byte in the lowest memory address.
    • Big Endian: Stores the most significant byte in the lowest memory address.

    Cryptographic Concepts

    • Integers: Positive, negative, no fraction parts.
    • Rational Numbers: Fractions.
    • Real Numbers: Include integers and rational numbers (e.g., 2.3).
    • Prime Numbers: Integers divisible only by 1 and themselves.
    • Natural Numbers: Positive integers.

    Additional Cryptographic Methods and Concepts

    • XOR, OR, AND: Logical operations (detailed in Shawn's Study Guide).
    • Mod Operator: Calculates the remainder of an integer division.
    • Monoalphabetic Cipher: A type of substitution cipher where each letter is consistently replaced by the same letter in the ciphertext.
    • Polyalphabetic Cipher: A substitution cipher that uses multiple alphabets to encrypt the plaintext.
    • Enigma Cipher Machine: Used a polyalphabetic substitution cipher with a secret key and did not repeat with a reasonable amount of time.
    • Asymmetric Encryption: Uses two keys (public and private) for encryption and decryption.
    • Symmetric Encryption: Uses a single key to both encrypt and decrypt.
    • Frequency Analysis: A technique to analyze ciphertext by determining the frequency of letters or other patterns and matching it to known frequencies in standard English.
    • Diffie-Hellman Key Exchange: Asymmetric algorithm for setting up symmetric encryption.

    Cryptographic Concepts(continued)

    • Perfect Forward Secrecy: New session keys are used to encrypt communication for each session.
    • Electronic Code Book (ECB): Encrypts each block using the same key and makes blocks independent of other blocks in the ciphertext. This leads to vulnerabilities with same plaintext blocks and repeated ciphertext.
    • Cipher Block Chaining (CBC): Uses an initialization vector (IV) to encrypt the first block. The output of the encryption is XORed with the next block. This makes each block depends on the previous block.
    • Cipher Feedback (CFB): A self-synchronizing stream cipher, XORs data with the outputs of the encryption process for each block.
    • Output Feedback (OFB): Converts a block cipher to a synchronous stream cipher. Generates a counter value and a nonce to encrypt and then XOR with the plaintext block
    • Cipher Modes: CTR (Counter) The non-ce value is used to XOR with the plaintext block in order to encrypt the plaintext to ciphertext.

    Additional Cryptographic Methods and Concepts(continued)

    • Padding: Methods to ensure plaintext messages fit into fixed-size blocks (used in block ciphers).
    • DES: A 64-bit block cipher with 56-bit key size.
    • 3DES: Uses two or three executions of the DES algorithm.
    • Entropy: Measure of unpredictability in a key.
    • Encryption/Decryption: Process of converting plaintext to ciphertext/ciphertext to plaintext.
    • Encoding/Decoding: Processes used to convert data from one form to another.
    • AES: A 128-bit block cipher used for symmetric encryption (has 10,12,14 rounds).
    • IDEA: A 64-bit block cipher used for symmetric encryption with more than 17 rounds.
    • RC2, RC5, RC6: Various stream ciphers.
    • Skipjack: A 64-bit block cipher used for symmetric encryption applications.

    Additional Cryptographic Methods and Concepts (continued)

    • Hashing: Provides integrity checks, creating unique fingerprints for data (hash value). MD5, SHA, SHA-2 are common hashing algorithms.
    • Hash Collisions: When two different inputs produce the same hash signature.
    • Pre-Image Attack: Finding an input that produces a specific hash output.
    • Birthday Attack: A brute-force attack based on the probability of finding collisions.
    • Known Plaintext Attack: An attacker knows parts of the ciphertext and the corresponding plaintext.
    • Chosen Ciphertext Attack: An attacker sends a message to the target encrypted with the target's public key and analyzes the message.
    • Active Attack: An attacker inserts or modifies messages.
    • Reply Attack: An attacker takes a valid message and re-sends it to the system.
    • Light-Weight Cryptography: Suitable for resource-constrained devices.
    • Bitcoin (BTC)/Ethereum: Use blockchain and peer-to-peer networks.
    • WEP, WEP+TKIP, WPA , WPA2: Wired Equivalent Privacy and Wi-Fi Protected Access protocols for wireless security. Includes block size, key sizes, IV sizes, and used methods.
    • Cryptographic Cracking: Exhaustive search using brute force to decrypt.
    • PKI: Public Key Infrastructure holds public keys for trusted parties.
    • Public Key/Private Key: Public key is widely distributed, used for encryption. Private key is kept secret, used for decryption.
    • PKCS: Standards for password-based encryption, signing, and certificates in PKI.
    • Certificate Authority (CA): Issues, manages, and verifies digital certificates in PKI. Creates hierarchical trust relations
    • Hashing algorithm: MD5, SHA, SHA-2

    Other Security Concepts

    • Salt: Random characters added to passwords before hashing to prevent attacks.
    • Bcrypt: Hashing algorithm for generating password hashes with salt.
    • Rainbow Table Attack: Offline attack mapping hashed values to original values.
    • HMAC: Message Authentication Code that ensures message integrity and authentication
    • APR1: Hashing algorithm for generating password hashes.
    • LDAP: Management of user credentials and access policies. Centralized management.
    • PHPass: PHP library for secure password hashing and storage.
    • PBKDF2: Password-Based Key Derivation Function 2 that generates stronger passwords from a given password and salt

    Other Security Concepts (continued)

    • Non-cryptographic Hash: Fast hash functions run on various platforms, useful for situations where cryptographic hashes are too computationally expensive. This creates hashes for data integrity, but without encryption it is prone to vulnerabilities.
    • CBC-MAC: Counter with Cipher block chaining, message authentication code, increases security.
    • AES-CCM: Counter mode with Cipher block chaining to increase security
    • Windows Hashing
    • Linux Hashing

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Intro to Cryptography PDF

    Description

    Test your knowledge on various cipher types, including Bifid, Playfair, and Vigenère ciphers. This quiz covers the fundamental principles and mechanisms behind these encryption methods. Challenge yourself and see how well you understand classical and modern ciphers.

    More Like This

    Classical Encryption Techniques
    10 questions
    Cipher Deciphering Challenge
    11 questions
    SSL Şifreli Durum (Cipher Suite)
    19 questions
    Use Quizgecko on...
    Browser
    Browser