26 Questions
Which type of encryption is commonly used for encrypting stored data on modern processors?
Symmetric encryption
What is a common approach to encrypt stored data for indefinite periods?
Back-end appliance
Which type of encryption algorithm is typically used for digital signatures and key management?
Public-key encryption
What type of function is used for message authentication without message encryption?
Secure hash functions
Which of the following is a property of hash functions that makes them secure?
Collision resistance
What does DES stand for in the context of encryption?
Data encryption standard
What is a digital signature according to NIST FIPS PUB 186-4?
A data-dependent bit pattern that provides origin authentication, data integrity, and signatory nonrepudiation
Which of the following is NOT one of the three digital signature algorithms specified in FIPS 186-4?
Diffie-Hellman Digital Signature Algorithm
What type of transformation results in a digital signature?
Cryptography
What is a key property required of random numbers for cryptographic applications?
Uniform distribution
Which algorithm is used to generate a symmetric key for a temporary session key?
Diffie-Hellman Key Exchange
What is the purpose of a digital envelope in cryptography?
To encrypt a message with a symmetric key
Which property of random numbers ensures that no value in the sequence can be inferred from others?
Independence
What distinguishes true random number generators (TRNG) from pseudorandom numbers?
They are unlikely to be predictable
Which algorithmic technique is typically used for random number generation in cryptographic applications?
Deterministic algorithms
What is the primary purpose of a digital signature verification algorithm?
To check the authenticity of a digital signature
What is another name for symmetric encryption?
Single-key encryption
What is the main advantage of Triple DES over regular DES?
Longer key length
What is the primary goal of brute-force attacks on symmetric encryption?
Gain access to all future messages encrypted with that key
Which encryption algorithm was selected as the Advanced Encryption Standard (AES) by NIST in 2001?
Rijndael
What is the main drawback of the Electronic Codebook (ECB) mode of symmetric encryption?
Allows cryptanalysts to exploit regularities in the plaintext
How does a Stream Cipher differ from a Block Cipher?
Processes continuously and produces output blocks for each input block
What is the fundamental requirement for secure use of symmetric encryption?
Securely obtaining and keeping the secret key
'Exploits the characteristics of the algorithm to attempt to deduce a specific plaintext or the key being used.' This statement refers to which type of attack?
'Cryptanalytic' attack
What is one of the drawbacks associated with Triple DES (3DES)?
Algorithm is slow in hardware
Why is combining authentication and confidentiality preferable in message encryption?
Ensures message authenticity and confidentiality
Learn about symmetric encryption, a universal technique for providing confidentiality for data. Discover the requirements for secure use and the importance of a strong encryption algorithm. This quiz is part of the Cyber Intelligence SECE47 course at Delta University for Science and Technology.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free