Cryptography Fundamentals Quiz
41 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which term refers to assurance that information and programs are changed only in a specified and authorized manner?

  • Integrity (correct)
  • Confusion
  • Confidentiality
  • Availability
  • What does the concept of confidentiality refer to?

  • The accuracy of information
  • The ability to access data freely
  • The availability of resources
  • The trust that private information is not disclosed to unauthorized individuals (correct)
  • Which of the following is NOT considered a password vulnerability?

  • User education (correct)
  • Electronic monitoring
  • Workstation hijacking
  • Offline dictionary attack
  • What is the key length in the AES cryptosystem?

    <p>128</p> Signup and view all the answers

    What method provides a one-time session key for two keys in cryptographic protocols?

    <p>Diffie-Hellman</p> Signup and view all the answers

    What is the key length for AES encryption?

    <p>128 bit</p> Signup and view all the answers

    What is the output size of the SHA-1 hashing algorithm?

    <p>160 bit</p> Signup and view all the answers

    The Diffie-Hellman algorithm is primarily used for which purpose?

    <p>One-time session key exchange</p> Signup and view all the answers

    Which term describes the input to an encryption algorithm?

    <p>Plaintext</p> Signup and view all the answers

    In access control, mailboxes are classified as what type?

    <p>Object</p> Signup and view all the answers

    Which of the following is an example of a simple transposition cipher?

    <p>Caesar Cipher</p> Signup and view all the answers

    What is the key size of the Data Encryption Standard (DES)?

    <p>56 bit</p> Signup and view all the answers

    What strategy emphasizes educating users on the importance of strong passwords and how to create them?

    <p>User education</p> Signup and view all the answers

    What is the standard key length in the AES cryptosystem?

    <p>256</p> Signup and view all the answers

    Which method provides a one-time session key derived from two keys?

    <p>Diffie-Hellman</p> Signup and view all the answers

    RBAC is primarily based on which of the following?

    <p>User identity rather than user rules in the system</p> Signup and view all the answers

    In cryptography, what is the property called that indicates it is infeasible to find an input that hashes to a given output?

    <p>Pre-image resistance</p> Signup and view all the answers

    Which type of attack uses one or more known plaintext-ciphertext pairs to infer the key?

    <p>Known plaintext</p> Signup and view all the answers

    How many bits does SHA-1 produce as a hash value?

    <p>160 bits</p> Signup and view all the answers

    In which block cipher operating mode does every previous ciphertext block influence the current plaintext block?

    <p>CBC</p> Signup and view all the answers

    What term refers to the control of system services or functions by an unauthorized entity?

    <p>Usurpation</p> Signup and view all the answers

    What is the size of the blocks into which a message is divided for SHA-512 hash computation?

    <p>512</p> Signup and view all the answers

    Which property does a hash function possess if it is infeasible to find any x, y such that H(y) = H(x)?

    <p>Strong collision resistance function</p> Signup and view all the answers

    What hash algorithm does the DSS signature utilize?

    <p>SHA-1</p> Signup and view all the answers

    Which algorithm is widely utilized in web SSL/TLS and wireless WEP/WPA?

    <p>AES</p> Signup and view all the answers

    Which statement is true regarding digital signatures?

    <p>It is used for authenticating both source and data integrity.</p> Signup and view all the answers

    When a hash function is applied for message authentication, what is the resulting value called?

    <p>Message Digest</p> Signup and view all the answers

    The 'man-in-the-middle' attack primarily targets which of the following?

    <p>Public-key algorithms</p> Signup and view all the answers

    What type of cryptanalytic attack provides the adversary with the least amount of information?

    <p>Ciphertext-only</p> Signup and view all the answers

    Which attack focuses on the likelihood of two different messages producing the same hash output?

    <p>Birthday attack</p> Signup and view all the answers

    Which of the following is an example of a simple substitution encryption algorithm?

    <p>Caesar cipher</p> Signup and view all the answers

    Which security threat is associated with an entity gaining unauthorized access to data?

    <p>Disclosure</p> Signup and view all the answers

    What is the public key for the RSA public key cipher where p = 3, q = 11, and e = 3?

    <p>(3, 33)</p> Signup and view all the answers

    In the context of identity verification, which term describes the certainty that a user has presented a valid credential?

    <p>Authentication</p> Signup and view all the answers

    In the Diffie-Hellman scheme with q = 11 and α = 2, if Alice selects a private key XA = 9, what will her public key be?

    <p>2^9 mod 11</p> Signup and view all the answers

    Which algorithm is explicitly deterministic and produces predictable number sequences?

    <p>Linear Congruential Generator</p> Signup and view all the answers

    What type of security threat involves an authorized entity receiving deceptive or false data?

    <p>Deception</p> Signup and view all the answers

    In the RSA encryption process, the ciphertext C is generated by the formula C = m^e mod n. If m = 6, e = 3, and n = 33, what is the value of C?

    <p>18</p> Signup and view all the answers

    Which of the following best describes an access control policy language that is based on attributes?

    <p>Attribute-Based Access Control</p> Signup and view all the answers

    When mitigating security threats, what does a proactive password checker aim to do?

    <p>Reject used passwords</p> Signup and view all the answers

    What type of modification disrupts the correct operation of system services?

    <p>Disruption</p> Signup and view all the answers

    Study Notes

    AES Key Length

    • AES uses a 128-bit key length.

    SHA-1 Hash Value

    • SHA-1 produces a 160-bit hash value.

    Diffie-Hellman Algorithm

    • The Diffie-Hellman algorithm is used for one-time session key exchange.

    Encryption Algorithm Input

    • The input of an encryption algorithm is plaintext.

    Mailboxes and Access Control

    • Mailboxes are an example of an object in access control.

    Transposition Cipher Example

    • AES is an example of a simple transposition cipher.

    Man-in-the-Middle Attack

    • A man-in-the-middle attack targets symmetric key algorithms or public-key algorithms.

    Data Encryption Standard (DES) Key Size

    • The key size of the Data Encryption Standard (DES) is 56 bits.

    Password Cracking - Traditional Approach

    • The traditional approach to password cracking is password guessing.

    User Education and Password Vulnerability

    • User education is part of addressing password vulnerability.

    DES Algorithm Rounds

    • DES uses 10 rounds.

    Random Numbers and Stream Keys

    • Random numbers are used to generate stream keys for symmetric stream ciphers.

    Asymmetric Key Encryption

    • Asymmetric key encryption uses different keys for sender and receiver.

    Hash Function Applicability

    • Hash functions can be applied to any sized data streams.

    Specific Account Attack

    • Specific account attacks target specific accounts within a system.

    Replay Attacks

    • Replay attacks involve repeating a previously captured user response.

    Security Attack Types

    • Attempts to alter system resources or affect their operation is a security attack.

    Block Cipher Operation Modes

    • Cipher Block Chaining (CBC), Cipher Feedback (CFB), and Counter (CTR) are block cipher operation modes.

    Encryption Algorithm Scenarios

    • Inputs to encryption algorithms include the XOR of 64 bits of plaintext and the preceding ciphertext to produce pseudorandom output.

    Security Concepts and Notations

    • Matching different security scenarios with corresponding security concepts and notations (e.g., Digital Signature Standard (DSS), Message Authentication).

    RSA Key Generation Steps

    • Finding n (n= p*q where p and q are prime numbers)
    • Calculating (n) (φ(n) = (p-1)(q-1))
    • Choosing e (e is relatively prime to (n))
    • Calculating d (d*e mod (n) =1)

    Diffie-Hellman Key Exchange

    • Agreement on a modulus (q) and a primitive root (a) as initial parameters
    • User A chooses a private key (XA) and calculates a public key (YĀ)
    • User B chooses a private key (XB) and calculates a public key (Yв)
    • Each user calculates the shared secret key using the other user's public key

    One-Time Pad Encryption

    • Plaintext is XORed with a key to produce ciphertext.

    Hash Function Properties

    • A hash function that is infeasible to find x such that H(x)=h is called pre-image resistant.

    SHA-1 Hash Output

    • SHA-1 produces a 160-bit hash output.

    Block Cipher Modes and Chaining

    • Cipher Block Chaining (CBC) mode, each previous cipher block is chained with the current plaintext block

    Virus Stages

    • Viruses move through dormant, triggering, propagation, and execution stages.

    Hash Function Collision Resistance

    • Hash functions satisfy the property of infeasibility of finding any x, y such that (H(y)=H(x))

    Public Key Encryption Algorithm

    • RSA is an example of a public key encryption algorithm.

    Digital Signature Functionality

    • A digital signature is used for authenticating both source and data integrity, and to protect against eavesdropping, and not for confidentiality.

    Types of attacks

    • The most common attacks include the man-in-the-middle attacks and chosen ciphertext attacks.

    Substitution and Transposition Ciphers

    • A substitution cipher replaces one symbol with another. An example is Caesar cipher, and a transposition cipher rearranges the order of symbols in an example is AES.

    Key Length of AES

    • The key length for AES is 128 bits.

    Message Authentication

    • MAC stands for Message Authentication Code.

    Encryption

    • It's concerned with converting plaintext to ciphertext, in which sender uses the hash function, and then encrypts the hash value with the sender's private key.

    Hash Functions

    • Hash functions, like SHA-1, are used for integrity. In this example, SHA-1 produces a 160-bit hash value

    Security Concepts

    • Security concepts, such as protection domains, true random numbers, and pseudorandom numbers are used for security, as well as Diffie-Hellman, key exchange, and public keys.

    Scenario Matching

    • Different security scenarios are matched with appropriate security concepts and related notations.

    Security Threats

    • Different situations are described and matched with security threats such as disruption, usurpation, disclosure, deception, worms, and rootkits.

    RSA Algorithm Steps

    • To generate RSA keys, Alice or Bob choose two distinct large prime numbers, p and q. Calculate n as their product, and (n) as (p – 1) * (q – 1). Then, select an integer "e" that is relatively prime to (n), and finally, calculate integer "d" such that (d*e ) mod (n) =1. The public key is (e, n), and the private key is (d, n) .

    Encryption and Decryption steps

    • To encrypt a message, the sender converts the numerical value of the plaintext into a numerical value, and then raises that numerical value to the power e, where e is the encryption exponent, and then mod's that result by n, the public modulus.
    • To decrypt, the receiver raises the ciphertext to the power of d, where d is the decryption exponent, modulo n. The result will be the original plaintext.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Test your knowledge on essential cryptography concepts, including AES key lengths, hash values, and various encryption algorithms. This quiz covers important algorithms such as DES and strategies for password security. Perfect for students learning about cyber security and encryption methods.

    More Like This

    Use Quizgecko on...
    Browser
    Browser