ECES-Certified-Encryption-Specialist
QUESTIONS WITH ACCURATE VERIFIED
ANSWERS (ACCURATE SOLUTIONS) A+
PASSED!! 2025 EXAM
Save
Terms in this set (213)
x.509 Digital Certificates extensions - Typically
.cer/.crt/.der
binary encoded. (.cer is Microsoft convention)
1. SubBytes - non-linear substitution - uses Rijndael
S-box
AES Phases 2. Shiftrows - transposition
3. MixColumns - mixing
4. AddRoundKey
Internet Key Exchange - Used by IPSec for Key
IKE
exchange.
(y2 = x3 + Ax + B) - Developed by Victor Miller and
EC Formula
Neil Koblitz in 1985
Rijndael Algorithm Symmetric Algorithm used for AES
• Time (amount of time needed to perform the
number of calculations to crack encryption)
3 Cryptanalysis • Memory (the amount of storage required to
Resources perform the attack)
• Data (the amount of plaintext/ciphertext required
for the attack)
https://quizlet.com/1047054164/eces-certified-encryption-specialist-questions-with-accurate-verified-answers-accurate-solutions-a-passed-2025-… 1/29
,5/22/25, 12:20 PM ECES-Certified-Encryption-Specialist QUESTIONS WITH ACCURATE VERIFIED ANSWERS (ACCURATE SOLUTIONS) A+ …
How likely would it be for any two people in a room
of 23 to share the same birthday?
22+21+20+19+18+17+16+15+14+13+12+11+10+9+8+7+6+5+4+3+2
+1 = 253, the total number of combinations with 23
Birthday Problem people. This is approximately a 50% chance for a
match(square root of 365 is approximately 23). The
probability reaches 100% at 367 people (since
there's 366 days in leap years), but with just 70
people, you are at over a 99.9% chance for a match.
Encryption function for fixed-size blocks of data
(typically 64 or 128 bits) - If you want to encrypt
something that isn't exactly one block long, you
have to use a block cipher mode. Slower than
Block cipher stream ciphers
• Larger block sizes increase security
• Larger key sizes increase security
• If the round is secure, then more rounds increase
security
Fastest Symmetric algorithm. Designed in 1993 by
Bruce Schneier.
• Feistel cipher
Blowfish • 16 rounds
• 64 bit blocks.
• Key size ranges from 32 to 448 bits.
• Designed as a replacement for DES.
• Class 1 - general certificate meant for individuals,
usually used for digitally signing/securing e-mail.
• Class 2 - for organizations where you have to
prove identities.
Classes of Digital • Class 3 - for server and software signing
Certificates identification.
• Class 4 - Online business transactions between
companies.
• Class 5 - Private organizations or governmental
agencies. Used between governmental agencies.
https://quizlet.com/1047054164/eces-certified-encryption-specialist-questions-with-accurate-verified-answers-accurate-solutions-a-passed-2025-… 2/29
, 5/22/25, 12:20 PM ECES-Certified-Encryption-Specialist QUESTIONS WITH ACCURATE VERIFIED ANSWERS (ACCURATE SOLUTIONS) A+ …
Established by The German Office for Information
Security (BSI)
• K1: A sequence of random numbers with a low
probability of containing identical numbers.
• K2: A sequence of numbers which is
indistinguishable from ""true random"" numbers
according to statistical tests.
Criteria for Quality of • K3: It should be impossible for any attacker to
Random Number calculate, or otherwise guess, from any given
Generators subsequence, any previous or future values in the
sequence.
• K4: It should be impossible for any attacker to
calculate, or otherwise guess from the inner state of
the generator, any previous values in the sequence
or any previous inner generator states.
• To be suitable for cryptography, any PRNG should
meet K3 or K4 standards.
Symmetric algorithm - Block Cipher - Based on
Lucifer Algorithm
• One of the most widely deployed algorithms in the
world, even though it is no longer recommended or
considered secure.
• Restricted key size of 56 bits and small block size
of 64 bits (has a 64-bit plaintext, which is split into
DES two 32-bit halves L and R).
• Consists of 16 rounds numbered 1 through 16. Each
round i uses a separate 48-bit round key Ki. Each
round key is formed by selecting 48 bits from the
56-bit key, and this selection is different for each
round key.
• The algorithm that derives these round keys from
the main block cipher key is called the key schedule.
https://quizlet.com/1047054164/eces-certified-encryption-specialist-questions-with-accurate-verified-answers-accurate-solutions-a-passed-2025-… 3/29