The most common way steganography is accomplished is via which one of the following?
Which of the following statements is most true regarding binary operations and encryption?
The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.
Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another medium is referred to as which one of the following?
In a Feistel cipher, the two halves of the block are swapped in each round. What does this provide?
A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.
Widely used, particularly with Microsoft operating systems. Created by MIT and derives its name from the mythical three headed dog. The is a great deal of verification for the tickets and the tickets expire quickly. Client authenticates to the Authentication Server once using a long term shared secret and receives back a Ticket-Granting Server. Client can reuse this ticket to get additional tickets without reusing the shared secret. These tickets are used to prove authentication to the Service Server.
Early attempt to make substitution ciphers more robust, masks letter frequencies, plain text letters map to multiple cipher text symbols.
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
What type of encryption uses different keys to encrypt and decrypt the message?
Calculates the average LSB and builds a table of frequencies and Pair of Values. Performs a test on the two tables. It measures the theoretical vs. calculated population difference.
Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.
Protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.
____________cryptography uses one key to encrypt a message and a different key to decrypt it.
A symmetric Stream Cipher published by the German engineering firm Seimans in 1993. A software based stream cipher that uses a Lagged Fibonacci generator along with concepts borrowed from shrinking generator ciphers.
Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
If you use substitution alone, what weakness is present in the resulting cipher text?
A part of understanding symmetric cryptography understands the modes in which it can be used. You are
explaining those modes to a group of cryptography students. The most basic encryption mode is____________.
The message is divided into blocks, and each block is encrypted separately with no modification to the process.
Which of the following is a substitution cipher used by ancient Hebrew scholars?
Which component of IPsec performs protocol-level functions that are required to encrypt and decrypt the packets?
Which of the following algorithms uses three different keys to encrypt the plain text?
Which one of the following is an authentication method that sends the username and password in cleartext?
You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key. The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?
Uses a formula, M_n = 2^n − 1 where n is a prime number, to generate primes. Works for 2, 3, 5, 7 but fails on 11 and on many other n values.
Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.
Bob’s password is hashed, and so is John’s. Even though they used different passwords, the hash is the same. What is this called?
Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted right before it is saved, then decrypted right after it is loaded, all w/o user intervention.
If you wished to see a list of revoked certificates from a CA, where would you look?
An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called ______.
Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?
This is a proprietary version of PAP. Encrypts username and password as it is sent across network.
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)
You are trying to find a modern method for security web traffic for use in your company's ecommerce web site. Which one of the following is used to encrypt web pages and uses bilateral authentication?
A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modified Polybius square with a single columnar transposition.
Denis is looking at an older system that uses DES encryption. A colleague has told him that DES is insecure due to a small key size. What is the key length used for DES?
If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a "strong" pseudorandom permutation.
Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.