Questions With Accurate Answers
What term below best describes an attack in which the attacker obtains
ciphertext corresponding to a set of plaintexts to use in an attempt to derive
the key used? Correct Answer - Chosen plaintext
Which attack is like a chosen-plaintext attack, except the attacker can obtain
ciphertexts encrypted under two different keys? Correct Answer -
Related-key Attack
What is a known plaintext attack and uses a linear approximation to describe
the behavior of the block cipher and was invented by Mitsarue Matsui ?
Correct Answer - Linear Cryptanalysis
From the list below, what term describes a mechanism used to create number
streams with random properties? Examples include Lagged Fibonacci and
Mersenne Twister. Correct Answer - Pseudo-random number generator
(PRNG)
What term from the list below best describes a number whose factors are 1
and itself? Correct Answer - Prime
Which term from the list below represents the total number of possible values
of keys in a cryptographic algorithm or other security measure? Correct
Answer - Key space
Which term from the list below represents the entire cryptographic operation
i.e. the algorithm, key, and key management functions? Correct Answer -
Cryptosystem
Which cipher makes use of a 5x5 table containing a keyword or key phrase
and encrypts pairs of letters or digraphs? Correct Answer - Playfair
Which cipher entails using a rod of a certain length to create/encrypt a
message, and the requiring the message recipient to use an identical sized rod
to read/decrypt the message? Correct Answer - Scytale
, What type of cryptanalysis involves the examination of differences in an input
and how that affects the resultant difference in output? Correct Answer -
Differential cryptanalysis
Which WiFi encryption standard is based on 802.11i and uses AES with CCMP
to provide for enhanced confidentiality, integrity and authentication?
Correct Answer - WPA-2
What are the two types of symmetric encryption? Correct Answer -
Block and Stream
Which of the following is true of hash encryption? Correct Answer -
Accepts a variable length input and produces a fixed length output
Which of the following is NOT required for a hash? Correct Answer -
Minimum key length
Which of the following are required for a hash? Correct Answer - input
can be any length and output has a fixed length, is one-way and collision-free
Which software-based stream cipher uses a lagged Fibonacci generator?
Correct Answer - FISH
The Advanced Encryption Standard is a subset of which algorithm? Correct
Answer - Rijndael
From the list below, which term is best described as random bits added to a
password hash to help with safeguarding passwords in storage? Correct
Answer - Salt
From the list below, which term is best described as a fixed-size, random
stream, that is added to a block cipher to increase randomness? Correct
Answer - Initialization Vector (IV)
The Feistel Network used in symmetric block encryption entails the splitting
of a block of plaintext prior to the application of respective encryption round
and XOR functions. Which cipher from the list below is an "unbalanced"
Feistel cipher (i.e. blocks of plaintext are split into unequal parts)? Correct
Answer - Skipjack