Podcast
Questions and Answers
Which type of encryption is commonly used for encrypting stored data on modern processors?
Which type of encryption is commonly used for encrypting stored data on modern processors?
- Symmetric encryption (correct)
- Stream ciphers
- Asymmetric encryption
- Hash functions
What is a common approach to encrypt stored data for indefinite periods?
What is a common approach to encrypt stored data for indefinite periods?
- Random numbers
- Symmetric block encryption algorithms
- Back-end appliance (correct)
- Use a commercially available encryption package
Which type of encryption algorithm is typically used for digital signatures and key management?
Which type of encryption algorithm is typically used for digital signatures and key management?
- Symmetric block encryption algorithms
- Stream ciphers
- Public-key encryption (correct)
- Hash functions
What type of function is used for message authentication without message encryption?
What type of function is used for message authentication without message encryption?
Which of the following is a property of hash functions that makes them secure?
Which of the following is a property of hash functions that makes them secure?
What does DES stand for in the context of encryption?
What does DES stand for in the context of encryption?
What is a digital signature according to NIST FIPS PUB 186-4?
What is a digital signature according to NIST FIPS PUB 186-4?
Which of the following is NOT one of the three digital signature algorithms specified in FIPS 186-4?
Which of the following is NOT one of the three digital signature algorithms specified in FIPS 186-4?
What type of transformation results in a digital signature?
What type of transformation results in a digital signature?
What is a key property required of random numbers for cryptographic applications?
What is a key property required of random numbers for cryptographic applications?
Which algorithm is used to generate a symmetric key for a temporary session key?
Which algorithm is used to generate a symmetric key for a temporary session key?
What is the purpose of a digital envelope in cryptography?
What is the purpose of a digital envelope in cryptography?
Which property of random numbers ensures that no value in the sequence can be inferred from others?
Which property of random numbers ensures that no value in the sequence can be inferred from others?
What distinguishes true random number generators (TRNG) from pseudorandom numbers?
What distinguishes true random number generators (TRNG) from pseudorandom numbers?
Which algorithmic technique is typically used for random number generation in cryptographic applications?
Which algorithmic technique is typically used for random number generation in cryptographic applications?
What is the primary purpose of a digital signature verification algorithm?
What is the primary purpose of a digital signature verification algorithm?
What is another name for symmetric encryption?
What is another name for symmetric encryption?
What is the main advantage of Triple DES over regular DES?
What is the main advantage of Triple DES over regular DES?
What is the primary goal of brute-force attacks on symmetric encryption?
What is the primary goal of brute-force attacks on symmetric encryption?
Which encryption algorithm was selected as the Advanced Encryption Standard (AES) by NIST in 2001?
Which encryption algorithm was selected as the Advanced Encryption Standard (AES) by NIST in 2001?
What is the main drawback of the Electronic Codebook (ECB) mode of symmetric encryption?
What is the main drawback of the Electronic Codebook (ECB) mode of symmetric encryption?
How does a Stream Cipher differ from a Block Cipher?
How does a Stream Cipher differ from a Block Cipher?
What is the fundamental requirement for secure use of symmetric encryption?
What is the fundamental requirement for secure use of symmetric encryption?
'Exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or the key being used.' This statement refers to which type of attack?
'Exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or the key being used.' This statement refers to which type of attack?
What is one of the drawbacks associated with Triple DES (3DES)?
What is one of the drawbacks associated with Triple DES (3DES)?
Why is combining authentication and confidentiality preferable in message encryption?
Why is combining authentication and confidentiality preferable in message encryption?