PrepAway - Latest Free Exam Questions & Answers

Which of the following encryption solutions should be deployed in this situation?

A Security Officer on a military base needs to encrypt several smart phones that will be going into
the field. Which of the following encryption solutions should be deployed in this situation?

PrepAway - Latest Free Exam Questions & Answers

A.
Elliptic curve

B.
One-time pad

C.
3DES

D.
AES-256

10 Comments on “Which of the following encryption solutions should be deployed in this situation?

  1. chris says:

    According to Darril Gibson, ECC is a strong security, and has been approved by the NSA in 2005 for digital signatures and Diffie-Hellman key agreements. I think the answer is A based on that information. Hard to say really though.




    1



    0
  2. Mike says:

    I chose D.

    Based on King Fisher it looks to be C:

    Other algorithms have been adapted to work with elliptic curves, including Diffie-
    Hellman and the Digital Signature Algorithm (DSA). The Diffie-Hellman version
    (known as Elliptic Curve Diffie-Hellman, or ECDH) uses elliptic curve public/private
    key pairs to establish the secret key. Another variant, ECDHE, runs in ephemeral
    mode, which as previously stated makes sure that a compromised message won’t
    start a chain reaction, and that other messages maintain their integrity. By its very
    design, the elliptic curve solves the problem of the extra computational power required
    by DHE. DSA is a U.S. federal government standard public key encryption
    algorithm used in digital signatures. The elliptic version is known as ECDSA. In
    general, the size of the public key in an elliptic curve–based algorithm can be 1/6 the
    size of the non-elliptic curve version. For example, ECDSA has a public key that is
    160 bits, but regular DSA uses a public key that is 1024 bits. This is part of the reasoning
    behind the reduced amount of CPU power needed.
    ECC cryptography is used with smart cards, wireless security, and other communications
    such as VoIP and IPsec (with DSA). It can be susceptible to side channel
    attacks (SCAs), which are attacks based on leaked information gained from the
    physical implementation (number and type of curves) of the cryptosystem, and
    fault attacks (a type of SCA), plus there are concerns about backdoors into the algorithm’s
    random generator. Elliptic curve cryptography (as well as RSA and other
    algorithms) is also theoretically vulnerable to quantum cryptanalysis–based computing
    attacks




    0



    1
    1. Mike says:

      This submission was then further developed into the Advanced
      Encryption Standard (AES) and became the U.S. federal government standard in
      2002. AES is the successor to DES/3DES and is another symmetric key encryption
      standard composed of three different versions of block ciphers: AES-128, AES-192,
      and AES-256. Actually, each of these has the same 128-bit cipher block size, but the
      key sizes for each are 128-bit, 192-bit, and 256-bit, respectively.
      AES is based on the substitution-permutation network, which takes plaintext and
      the key and applies x number of rounds to create the ciphertext. These rounds consist
      of substitution boxes and permutation boxes (usually in groups of 4X4 bytes)
      that convert the plaintext input bits to ciphertext output bits. AES specifies 10, 12,
      or 14 rounds for each of the respective versions.
      AES is fast, uses minimal resources, and can be used on a variety of platforms. For
      example, it is the encryption algorithm of choice if you have a wireless network
      running the WPA2 protocol; the IEEE 802.11i standard specifies the usage of
      AES with WPA2, and in the process deprecates WEP. (See Chapter 8 , “Securing
      Network Media and Devices,” for more about WEP and WPA.) You will also find
      AES as the encrypting protocol for remote control applications. These are examples
      of data in motion (also called data in transit). Any network session that uses AES
      would fall into this category. But memory encryption would fall into that category
      as well. For example, there are programs that can encrypt passwords and other personally
      identifiable information (PII) as it is passing through RAM. They often use
      AES or Twofish




      1



      0

Leave a Reply