what type of attack am I?
This type of attack is generally most applicable to public-key cryptosystems, what type of attack am I?
Which of the following concerning the Rijndael block ci…
Which of the following concerning the Rijndael block cipher algorithm is NOT true?
However, using mathematical properties of modular arith…
The computations involved in selecting keys and in enciphering data are complex, and are not practical for
manual use. However, using mathematical properties of modular arithmetic and a method known as
“_________________,” RSA is quite feasible for computer use.
Which of the following statements is MOST accurate rega…
Which of the following statements is MOST accurate regarding a digital signature?
how many rounds of substitution and permutation?
The Data Encryption Algorithm performs how many rounds of substitution and permutation?
Which of the following is NOT a property of a one-way h…
Which of the following is NOT a property of a one-way hash function?
which the analyst tries to determine the key from knowl…
Which of the following can best be defined as a cryptanalysis technique in which the analyst tries to determine
the key from knowledge of some plaintext-ciphertext pairs?
Which of the following can best be defined as a key rec…
Which of the following can best be defined as a key recovery technique for storing knowledge of a
cryptographic key by encrypting it with another key and ensuring that only certain third parties can perform the
decryption operation to retrieve the stored key?
Which of the following can best be defined as a key dis…
Which of the following can best be defined as a key distribution protocol that uses hybrid encryption to convey
session keys? This protocol establishes a long-term key once, and then requires no prior communication in
order to establish or exchange keys on a session-by-session basis?
Which of the following is defined as an Internet, IPsec…
Which of the following is defined as an Internet, IPsec, key-establishment protocol, partly based on OAKLEY,
that is intended for putting in place authenticated keying material for use with ISAKMP and for other security
associations?