Podcast
Questions and Answers
Which of the following is NOT required for a hash?
Which of the following is NOT required for a hash?
- Non-reversible
- Minimum key length of 256 bits (correct)
- Variable-length input, fixed-length output
- Few collisions
What does a 'collision' refer to in cryptography?
What does a 'collision' refer to in cryptography?
- Transposition
- Substitution
- Collision (correct)
- Convergence
What is the purpose of a 'salt' in cryptography?
What is the purpose of a 'salt' in cryptography?
- Key whitening
- Key rotation
- Random bits intermixed with a symmetric cipher to increase randomness and make it more secure
- Random bits intermixed with a hash to increase randomness and reduce collisions (correct)
Which hash is described in RFC 1321?
Which hash is described in RFC 1321?
What is the average earning of a seller per month by selling study notes on Docmerit?
What is the average earning of a seller per month by selling study notes on Docmerit?
What is NOT mentioned as an upload on Docmerit?
What is NOT mentioned as an upload on Docmerit?
What is the size block used by FORK256?
What is the size block used by FORK256?
In 1977, researchers at MIT described which asymmetric algorithm?
In 1977, researchers at MIT described which asymmetric algorithm?
What is the formula (M^e)(%n) related to?
What is the formula (M^e)(%n) related to?
Which of the following equations is related to EC?
Which of the following equations is related to EC?
What is defined by U.S. Patent 5,231,668 and FIPS 186?
What is defined by U.S. Patent 5,231,668 and FIPS 186?
What is X.509?
What is X.509?
What is contained in a CRL?
What is contained in a CRL?
What does the Online Certificate Status Protocol (OCSP) provide?
What does the Online Certificate Status Protocol (OCSP) provide?
In terms of cryptanalysis, what does it mean to break a cipher?
In terms of cryptanalysis, what does it mean to break a cipher?
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
What is a TGS?
What is a TGS?
What is Kerchoff's principle?
What is Kerchoff's principle?
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publically disclosed without damaging security?
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publically disclosed without damaging security?
A process that puts a message into the least significant bits of a binary file is called what?
A process that puts a message into the least significant bits of a binary file is called what?
If you wished to see a list of revoked certificates from a CA, where would you look?
If you wished to see a list of revoked certificates from a CA, where would you look?
Flashcards are hidden until you start studying