{"id":111141,"date":"2023-07-28T21:56:06","date_gmt":"2023-07-28T21:56:06","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=111141"},"modified":"2023-07-28T21:56:11","modified_gmt":"2023-07-28T21:56:11","slug":"wgu-c839-exam-100-real-oa-exam-questions-and-correct-answers-2023-2024-verified-answersagrade","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/07\/28\/wgu-c839-exam-100-real-oa-exam-questions-and-correct-answers-2023-2024-verified-answersagrade\/","title":{"rendered":"WGU C839 EXAM 100 REAL OA EXAM QUESTIONS AND CORRECT ANSWERS 2023-2024 (VERIFIED ANSWERS)|AGRADE"},"content":{"rendered":"\n<p>Wgu c839 exam oa exam quizlet<br>Wgu c839 exam oa exam questions<br>Wgu c839 exam oa exam pdf<br>Wgu c839 exam oa exam answers<br>Wgu c839 exam oa exam answer key<br>c839 wgu reddit<br>pre assessment introduction to cryptography<br>wgu d334<\/p>\n\n\n\n<p>DES<br>64 Bit Block &#8211; 56 Bit Key &#8211; 16 Rounds<\/p>\n\n\n\n<p>AES<br>128 Bit Block &#8211; 128, 192, 256 Bit Key &#8211; 10, 12, 14 Rounds<\/p>\n\n\n\n<p>BlowFish<br>64 Bit Block &#8211; 32 thru 448 Bit Key &#8211; 16 Rounds<\/p>\n\n\n\n<p>TwoFish<br>128 Bit Block &#8211; 1 thru 256 Bit Key &#8211; 16 Rounds<\/p>\n\n\n\n<p>Serpent<br>128 Bit Block 128, 192, 256 Bit Key &#8211; 32 Rounds<\/p>\n\n\n\n<p>SkipJack<br>64 Bit Block &#8211; 80 Bit Key &#8211; 32 Rounds<\/p>\n\n\n\n<p>IDEA<br>64 Bit Block &#8211; 128 Bit Key &#8211; 8.5 Rounds<\/p>\n\n\n\n<p>Symmetric Block Ciphers<br>DES &#8211; AES &#8211; BlowFish &#8211; TwoFish &#8211; Serpent &#8211; SkipJack &#8211; IDEA<\/p>\n\n\n\n<p>Symmetric Block Ciphers with 64 Bit Block Size<br>DES &#8211; BlowFish &#8211; SkipJack &#8211; IDEA<\/p>\n\n\n\n<p>Symmetric Block Ciphers with 128 Bit Block Size<br>AES &#8211; TwoFish &#8211; Serpent<\/p>\n\n\n\n<p>Symmetric Block Ciphers with 128, 192, 256 Bit Key Size<br>AES &#8211; Serpent<\/p>\n\n\n\n<p>Symmetric Block Ciphers with 16 Rounds<br>DES &#8211; BlowFish &#8211; TwoFish<\/p>\n\n\n\n<p>Symmetric Block Ciphers with 32 Rounds<br>Serpent &#8211; SkipJack<\/p>\n\n\n\n<p>RC4<br>1 thru 2048 Bit Key Size &amp; 1 Round (40 bit minimum recommended)<\/p>\n\n\n\n<p>FISH<br>Uses Lagged Fibonacci pseudorandom number generator<\/p>\n\n\n\n<p>PIKE<br>Revised version of FISH to address known plaintext attack vulnerabilities<\/p>\n\n\n\n<p>Symmetric Stream Ciphers<br>RC4 &#8211; Fish &#8211; Pike<\/p>\n\n\n\n<p>Asymmetric Encryption Algos<br>RSA &#8211; ECC &#8211; El Gamal &#8211; DSA<\/p>\n\n\n\n<p>RSA<br>Leverages prime number characteristics, 1024-4096 bit variable key size, 1 round. Uses Trapdoor function to enable use for encryption and digital signatures. One-way trapdoor functions can be inverted with knowledge of trapdoor factorization information.<\/p>\n\n\n\n<p>ECC<br>Leverages discrete logarithm characteristics<\/p>\n\n\n\n<p>El Gamal<br>Used in recent versions of PGP<\/p>\n\n\n\n<p>DSA<br>A Federal Information Processing Standard for digital signatures (FIPS 186)<\/p>\n\n\n\n<p>Hash Algos<br>MD5 &#8211; SHA1 &#8211; SHA256 &#8211; FORK256 &#8211; RIPEMD160 &#8211; GOST &#8211; TIGER<\/p>\n\n\n\n<p>MD5<br>128 Bit Hash Value<\/p>\n\n\n\n<p>SHA1<br>160 Bit Hash Value<\/p>\n\n\n\n<p>SHA256<br>256 Bit Hash Value<\/p>\n\n\n\n<p>FORK256<br>256 Bit Hash Value<\/p>\n\n\n\n<p>GOST<br>256 Bit Hash Value<\/p>\n\n\n\n<p>TIGER<br>192 Bit Hash Value<\/p>\n\n\n\n<p>Key Exchange Algos<br>Diffie Hellman (DH) &#8211; Menezes-Qu-Vanstone (MQV) &#8211; Key Exchange Algorithm (KEA) &#8211; Elliptic Curve DH (ECDH)<\/p>\n\n\n\n<p>RSA Encryption Formula<br>C = Me % n<\/p>\n\n\n\n<p>RSA Decryption Formula<br>P = Cd % n<\/p>\n\n\n\n<p>EC Formula<br>y2 = x3 + Ax + B<\/p>\n\n\n\n<p>Symmetric Decryption Formula<br>P = D(k,c)<\/p>\n\n\n\n<p>Symmetric Encryption Formula<br>C = E(k,p)<\/p>\n\n\n\n<p>Cipher disk invented by <strong>_ in Year __<\/strong><br>Leon Alberti &#8211; 1466<\/p>\n\n\n\n<p>Vigenere Cipher invented by <strong><em>_ in _<\/em><\/strong> Year<br>Giovan Battista Bellaso &#8211; 1553<\/p>\n\n\n\n<p>Playfair Cipher invented by <strong><em>_ in _<\/em><\/strong> Year<br>Charles Wheatstone &#8211; 1854<\/p>\n\n\n\n<p>1st successful attack on the Vigenere cipher published by <strong><em>_ in _<\/em><\/strong> Year<br>Friedrich Kasiski &#8211; 1863<\/p>\n\n\n\n<p>ADFGVX Cipher invented by <strong><em>_ in _<\/em><\/strong> Year<br>Colonel Fritz Nebel &#8211; 1918<\/p>\n\n\n\n<p>Enigma Machine invented by <strong><em>_ in _<\/em><\/strong> Year<br>Arthur Scherbius &#8211; 1918<\/p>\n\n\n\n<p>RSA invented <strong><em>_ in Year _<\/em><\/strong><br>Ron Rivest, Adi Shamir, and Len Adleman &#8211; 1977<\/p>\n\n\n\n<p>X.509 first use in <em>__<\/em> Year<br>1988<\/p>\n\n\n\n<p>DSA filed and attributed to <strong><em>_ Patent Number <\/em><\/strong><em>in ___<\/em> Year<br>David Kravitz &#8211; US Patent 5,231,668 &#8211; 1991<\/p>\n\n\n\n<p>DSA adopted by US Government in <strong><em>_ Year with FIPS _<\/em><\/strong><br>1993 &#8211; 186<\/p>\n\n\n\n<p>FISH (Fibonacci Shrinking) published by <strong><em>_ in<\/em><\/strong><br>Siemens &#8211; 1993<\/p>\n\n\n\n<p>TIGER was designed by <strong><em>_ in _<\/em><\/strong> Year<br>Ross Anderson &#8211; 1995<\/p>\n\n\n\n<p>AES (Rijndael) announced as replacement for DES in <strong><em>_ Year with FIPS _<\/em><\/strong><br>2001 &#8211; 197<\/p>\n\n\n\n<p>Electronic Code Book (ECB)<br>Each block is encrypted independently, BUT identical plaintext blocks are encrypted into identical ciphertext blocks<\/p>\n\n\n\n<p>Cipher Bock Chaining (CBC)<br>Each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block depends on all plaintext blocks processed up to that point. To make each message unique, an initialization vector must be used in the first block.<\/p>\n\n\n\n<p>Propagating Cipher Block Chaining (PCBC)<br>Each block of plaintext is XoRed with the XOR of the previous plaintext block and the previous ciphertext block before being encrypted. As with CBC mode, an initialization vector is used in the first block.<\/p>\n\n\n\n<p>Cipher Feedback (CFB)<br>Allows encryption of partial blocks rather than requiring full blocks for encryption. This eliminates the need to pad a block like in CBC.<\/p>\n\n\n\n<p>Output Feedback (OFB) Mode<br>Makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.<\/p>\n\n\n\n<p>Counter Mode<br>Turns a block cipher into a stream cipher. It generates the next keystream block by encrypting successive values of a &#8220;counter&#8221;.<\/p>\n\n\n\n<p>Substitution<br>involves XORing the plaintext message with the key?<\/p>\n\n\n\n<p>Trapdoor<br>allows RSA to be used for both encryption and digital signatures.<\/p>\n\n\n\n<p>Diffusion<br>a change in in one bit in the plaintext would affect multiple characters in the ciphertext<\/p>\n\n\n\n<p>which two symmetric block encryption modes turn block ciphers into stream ciphers?<br>OFB &#8211; CTR<\/p>\n\n\n\n<p>Ciphertext Only Attack<br>an attack in which the attacker only has access to the ciphertext of a message?<\/p>\n\n\n\n<p>Co-Prime<br>a number that only shares the number 1 as a common factor with another?<\/p>\n\n\n\n<p>Differential cryptanalysis<br>involves the examination of differences in an input and how that affects the resultant difference in output<\/p>\n\n\n\n<p>Mono-Alphabetic Ciphers<br>Atbash &#8211; Scytale &#8211; ROT-13<\/p>\n\n\n\n<p>Playfair<br>Cipher makes use of a 5&#215;5 table containing a keyword or key phrase and encrypts pairs of letters or digraphs<\/p>\n\n\n\n<p>Cryptosystem<br>represents the entire cryptographic operation i.e. the algorithm, key, and key management functions<\/p>\n\n\n\n<p>Prime<br>number whose factors are 1 and itself?<\/p>\n\n\n\n<p>Pseudo-random number generator<br>a mechanism used to create number streams with random properties. Examples include Lagged Fibonacci and Mersenne Twister<\/p>\n\n\n\n<p>Kerberos Ticket<br>Used to authenticate. Contains the identity of the client, the session key, timestamp, and checksum<\/p>\n\n\n\n<p>Kerberos TGS<br>Issues tickets<\/p>\n\n\n\n<p>Kerberos KDC<br>Server that provides the initial ticket<\/p>\n\n\n\n<p>Kerberos TGT<br>The ticket that is granted during the authentication process<\/p>\n\n\n\n<p>Kerberos AS<br>Server that authorizes the principal and connects them to the ticket granting server<\/p>\n\n\n\n<p>Chosen Plaintext Attack<br>an attack in which the attacker obtains ciphertext corresponding to a set of plaintexts to use in an attempt to derive the key used<\/p>\n\n\n\n<p>What are the four general steps involved with AES?<br>Rounds &#8211; Initial Round &#8211; Final Round &#8211; Key Expansion<\/p>\n\n\n\n<p>To be suitable for cryptography, what German Federal Office for Information Security (BSI) criteria level (s) should a PRNG meet?<br>K3 &amp; K4<\/p>\n\n\n\n<p>Yarrow<br>an algorithm that generates PRNG outputs and employs a reseed mechanism to reseed the key periodically with new entries from one of the two entropy pool employed<\/p>\n\n\n\n<p>Clustering<br>An instance where different encryption keys generate the same ciphertext from the same plaintext message<\/p>\n\n\n\n<p>Knowledge of the factorization of the trapdoor information in RSA computations, allows you to be able to <strong>_<\/strong> the function.<br>Invert<\/p>\n\n\n\n<p>What type of encryption uses different keys to encrypt and decrypt the message?<\/p>\n\n\n\n<p>A Symmetric<br>B Private key<br>C Secure<br>D Asymmetric<br>D<\/p>\n\n\n\n<p>The most widely used asymmetric encryption algorithm is what?<\/p>\n\n\n\n<p>A RSA<br>B Vigenere<br>C DES<br>D Caesar Cipher<br>A<\/p>\n\n\n\n<p>Original, unencrypted information is referred to as <em>__<\/em>.<\/p>\n\n\n\n<p>A text<br>B plaintext<br>C cleantext<br>D ciphertext<br>B<\/p>\n\n\n\n<p>Which of the following is NOT an asymmetric system?<\/p>\n\n\n\n<p>A PGP<br>B RSA<br>C SSL<br>D DES<br>D<\/p>\n\n\n\n<p>In order for User A to send User B an encrypted message that only User B can read, User A must encrypt message with which of the following keys?<\/p>\n\n\n\n<p>A User A&#8217;s public key<br>B User A&#8217;s private key<br>C User B&#8217;s public key<br>D User B&#8217;s private key<br>C<\/p>\n\n\n\n<p>The greatest weakness with symmetric algorithms is <strong>_<\/strong>.<\/p>\n\n\n\n<p>A They are less secure than asymmetric<br>B The problem of key exchange<br>C They are slower than asymmetric<br>D The problem of generating keys<br>B<\/p>\n\n\n\n<p>Which of the following is generally true about block sizes?<\/p>\n\n\n\n<p>A Smaller block sizes increase security<br>B Block sizes must be more than 256 bits to be secure<br>C Block size is irrelevant to security<br>D Larger block sizes increase security<br>D<\/p>\n\n\n\n<p>A <strong>_<\/strong> is a function that takes a variable-size input m and returns a fixed-size string.<\/p>\n\n\n\n<p>A Symmetric cipher<br>B Hash<br>C Asymmetric cipher<br>D Feistel<br>B<\/p>\n\n\n\n<p>Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?<\/p>\n\n\n\n<p>A Elliptic Curve<br>B RSA<br>C MD5<br>D Diffie-Hellman<br>D<\/p>\n\n\n\n<p>A <strong><em>_<\/em><\/strong> is a digital representation of information that identifies you as a relevant entity by a trusted third party?<\/p>\n\n\n\n<p>A Digital Signature<br>B Hash<br>C Ownership stamp<br>D Digest<br>A<\/p>\n\n\n\n<p>What is the standard used by most digital certificates?<\/p>\n\n\n\n<p>A X.509<br>B CRL<br>C RFC 2298<br>D OCSP<br>A<\/p>\n\n\n\n<p>DES uses keys of what size?<\/p>\n\n\n\n<p>A 56 bits<br>B 192 bits<br>C 128 bits<br>D 64 bits<br>A<\/p>\n\n\n\n<p>Which of the following is NOT a key size used by AES?<\/p>\n\n\n\n<p>A 512 bits<br>B 128 bits<br>C 192 bits<br>D 256 bits<br>A<\/p>\n\n\n\n<p>Which of the following was a multi alphabet cipher widely used from the 16th century (1553) to the early 20th century (1900s)?<\/p>\n\n\n\n<p>A Vigenere<br>B Caesar<br>C Atbash<br>D Scytale<br>A<\/p>\n\n\n\n<p>Which of the following is a substitution cipher used by ancient Hebrew scholars?<\/p>\n\n\n\n<p>A Caesar<br>B Vigenere<br>C Scytale<br>D Atbash<br>D<\/p>\n\n\n\n<p>Shifting each letter in the alphabet a fixed number of spaces to the right or left is an example of what?<\/p>\n\n\n\n<p>A Bit shifting<br>B Confusion<br>C Multi substitution<br>D Single substitution<br>D<\/p>\n\n\n\n<p>Which of the following most accurately defines encryption?<\/p>\n\n\n\n<p>A changing a message so it can only be easily read by the intended recipient<\/p>\n\n\n\n<p>B Making binary changes to a message to conceal it<\/p>\n\n\n\n<p>C changing a message using complex mathematics<\/p>\n\n\n\n<p>D Applying keys to plain text<br>A<\/p>\n\n\n\n<p>If you use substitution alone, what weakness is present in the resulting cipher text?<\/p>\n\n\n\n<p>A It is the same length as the original text<br>B It is easily broken with modern computers.<br>C It is too simple.<br>D Because it maintains letter and word frequency.<br>D<\/p>\n\n\n\n<p><strong>_<\/strong> uses at least two different shifts, changing the shift with different letters in the plain text.<\/p>\n\n\n\n<p>A Atbash<br>B multi-alphabet encryption<br>C Scytale<br>D Caesar cipher<br>B<\/p>\n\n\n\n<p><em>__<\/em> was designed to provide built in cryptography for the clipper chip.<\/p>\n\n\n\n<p>A Blowfish<br>B Skipjack<br>C GOST<br>D 3DES<br>B<\/p>\n\n\n\n<p>Which of the following uses an 80 bit key on 64 bit blocks?<\/p>\n\n\n\n<p>A Twofish<br>B AES<br>C Skipjack<br>D DES<br>C<\/p>\n\n\n\n<p>With <strong>_<\/strong>, the message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption.<\/p>\n\n\n\n<p>A Electronic codebook (ECB)<br>B Cipher-block chaining (CBC)<br>C Cipher feedback (CFB)<br>D Output feedback (OFB)<br>A<\/p>\n\n\n\n<p>Which of the following is an example of an unbalanced Feistel?<\/p>\n\n\n\n<p>A 3DES<br>B Skipjack<br>C Twofish<br>D AES<br>B<\/p>\n\n\n\n<p>This process is done by having each block of plaintext is XORed with the previous ciphertext block before being encrypted.<\/p>\n\n\n\n<p>A Output feedback (OFB)<br>B Cipher-block chaining (CBC)<br>C Electronic codebook (ECB)<br>D Cipher feedback (CFB)<br>B<\/p>\n\n\n\n<p>The process wherein the ciphertext block is encrypted then the ciphertext produced is XOR&#8217;d back with the plaintext to produce the current ciphertext block is called what?<\/p>\n\n\n\n<p>A Output feedback (OFB)<br>B Cipher-block chaining (CBC)<br>C Cipher feedback (CFB)<br>D Electronic codebook (ECB)<br>C<\/p>\n\n\n\n<p>This is a method for turning a block cipher into a stream cipher by generating a keystream block, which are then XORed with the plaintext blocks to get the ciphertext.<\/p>\n\n\n\n<p>A Cipher feedback (CFB)<br>B Electronic codebook (ECB)<br>C Output feedback (OFB)<br>D Cipher-block chaining (CBC)<br>C<\/p>\n\n\n\n<p>Which of the following modes can be used to turn a block cipher into a stream cipher?<\/p>\n\n\n\n<p>A Propagating cipher-block chaining (PCBC) and Electronic codebook (ECB)<\/p>\n\n\n\n<p>B Counter Mode (CTR) and Propagating cipher-block chaining (PCBC)<\/p>\n\n\n\n<p>C Electronic codebook (ECB) and Output feedback (OFB)<\/p>\n\n\n\n<p>D Output feedback (OFB) and Counter Mode (CTR)<br>D<\/p>\n\n\n\n<p>A fixed-size pseudorandom number that is fed into a symmetric cipher to increase randomness is called what?<\/p>\n\n\n\n<p>A IV<br>B Key<br>C Chain<br>D Salt<br>A<\/p>\n\n\n\n<p>A number that is used only one time then discarded is called what?<\/p>\n\n\n\n<p>A Nonce<br>B Chain<br>C Salt<br>D IV<br>A<\/p>\n\n\n\n<p>Which of the following is a stream cipher that uses variable length key from 1 to 256 bytes?<\/p>\n\n\n\n<p>A RC4<br>B AES<br>C DESx<br>D DES<br>A<\/p>\n\n\n\n<p>This algorithm was published by the German engineering firm Seimans in 1993. It is a software based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.<\/p>\n\n\n\n<p>A RC4<br>B Blowfish<br>C FISH<br>D Twofish<br>C<\/p>\n\n\n\n<p>Which of the following is NOT required for a hash?<\/p>\n\n\n\n<p>A Minimum key length of 256 bits<br>B Variable-length input, fixed-length output<br>C Non-reversible<br>D Few collisions<br>A<\/p>\n\n\n\n<p>A <strong>__<\/strong> refers to a situation where two different inputs yield the same output.<\/p>\n\n\n\n<p>A Substitution<br>B Convergence<br>C Collision<br>D Transposition<br>C<\/p>\n\n\n\n<p>What is a salt?<\/p>\n\n\n\n<p>A Key rotation<\/p>\n\n\n\n<p>B Random bits intermixed with a hash to increase randomness and reduce collisions.<\/p>\n\n\n\n<p>C Random bits intermixed with a symmetric cipher to increase randomness and make it more secure.<\/p>\n\n\n\n<p>D Key whitening<br>B<\/p>\n\n\n\n<p>RFC 1321 describes what hash?<\/p>\n\n\n\n<p>A RIPEMD<br>B SHA1<br>C GOST<br>D MD5<br>D<\/p>\n\n\n\n<p>What size block does FORK256 use?<\/p>\n\n\n\n<p>A 256<br>B 128<br>C 512<br>D 64<br>C<\/p>\n\n\n\n<p>In 1977 researchers at MIT described what asymmetric algorithm?<\/p>\n\n\n\n<p>A RSA<br>B AES<br>C DH<br>D EC<br>A<\/p>\n\n\n\n<p>What is the formula (M^e)(%n) related to?<\/p>\n\n\n\n<p>A Encrypting with EC<br>B Generating Mersenne primes<br>C Decrypting with RSA<br>D Encrypting with RSA<br>C<\/p>\n\n\n\n<p>Which of the following equations is related to EC?<\/p>\n\n\n\n<p>A P = Cd%n<br>B Me%n<br>C y2 = x3 + Ax + B<br>D Let m = (p-1)(q-1)<br>C<\/p>\n\n\n\n<p>U.S. Patent 5,231,668 and FIPS 186 define what algorithm?<\/p>\n\n\n\n<p>A AES<br>B RSA<br>C Elliptic Curve (EC)<br>D Digital Signature Algorithm (DSA)<br>D<\/p>\n\n\n\n<p>What is X.509?<\/p>\n\n\n\n<p>A The standard for PGP certificates<br>B The standard for encrypting email<br>C The standard for FIPS 186<br>D The standard for digital certificates<br>D<\/p>\n\n\n\n<p>What is contained in a CRL?<\/p>\n\n\n\n<p>A Keys for RSA<br>B New certificates<br>C Revoked certificates<br>D Keys for AES<br>C<\/p>\n\n\n\n<p>What does the Online Certificate Status Protocol (OCSP) provide?<\/p>\n\n\n\n<p>A Revoked certificates<br>B Hashing<br>C VPN connectivity<br>D Encryption<br>A<\/p>\n\n\n\n<p>In terms of cryptanalysis, what does it mean to break a cipher?<\/p>\n\n\n\n<p>A finding a method to decrypt a message that is at least twice as efficient as brute force<\/p>\n\n\n\n<p>B trying every possible key until you can decrypt the message<\/p>\n\n\n\n<p>C deploying an algorithm that uses a 228 bit key<\/p>\n\n\n\n<p>D finding any method to decrypt the message that is more efficient than brute force<br>D<\/p>\n\n\n\n<p>An authentication method that periodically re-authenticates the client by establishing a hash that is then resent from the client is called <strong>__<\/strong>.<\/p>\n\n\n\n<p>A PAP<br>B CHAP<br>C SPAP<br>D EAP<br>B<\/p>\n\n\n\n<p>What is a TGS?<\/p>\n\n\n\n<p>A The server that grants Kerberos tickets<br>B protocol for encryption<br>C protocol for key exchange<br>D The server that escrows keys<br>A<\/p>\n\n\n\n<p>What is Kerchoff&#8217;s principle?<\/p>\n\n\n\n<p>A A minimum key size of 256 bits is necessary for security.<br>B Both algorithm and key should be kept secret.<br>C A minimum of 15 rounds is needed for a Feistel cipher to be secure.<br>D Only the key needs to be secret, not the actual algorithm.<br>D<\/p>\n\n\n\n<p>Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publically disclosed without damaging security?<\/p>\n\n\n\n<p>A Babbage&#8217;s principle<br>B Kerkchoff&#8217;s principle<br>C Vigenere&#8217;s principle<br>D Shamir&#8217;s principle<br>B<\/p>\n\n\n\n<p>A process that puts a message into the least significant bits of a binary file is called what?<\/p>\n\n\n\n<p>A Symmetric cryptography<br>B Masking<br>C Steganography<br>D Asymmetric cryptography<br>C<\/p>\n\n\n\n<p>If you wished to see a list of revoked certificates from a CA, where would you look?<\/p>\n\n\n\n<p>A CRL<br>B CA<br>C RFC<br>D RA<br>A<\/p>\n\n\n\n<p>Which of the following is generally true about block ciphers?<\/p>\n\n\n\n<p>A Secret block ciphers should be trusted.<br>B Block ciphers permute the bits of the input plaintext.<br>C The plaintext and ciphertext are always the same size.<br>D A block cipher is an encryption function for variable-size blocks of data.<br>C<\/p>\n\n\n\n<p>What does the OCSP protocol provide?<\/p>\n\n\n\n<p>A encryption<br>B VPN connectivity<br>C hashing<br>D a real time protocol for verifying certificates<br>D<\/p>\n\n\n\n<p>U.S. encryption standard that replaced DES. Block symmetric cipher that uses 128-bit block sizes and various key lengths (128, 192, 256).<br>AES<\/p>\n\n\n\n<p>DES, 3DES, SHA, AES (some AES implementations are Type I)<br>Class 3 Algorithms<\/p>\n\n\n\n<p>Encryption method where the sender and receiver use an instance of the same key for encryption and decryption purposes.<br>Symmetric<\/p>\n\n\n\n<p>Block symmetric algorithm chosen by NIST as an encryption standard in 1976. It uses a 56-bit true key bit size, 64-bit block size, and 16 rounds of computation.<br>Data Encryption Standard (DES)<\/p>\n\n\n\n<p>technical specification indicating how multimedia data and e-mail binary attachments are to be transferred.<br>Multipurpose Internet Mail Extensions (MIME)<\/p>\n\n\n\n<p>Valid data transmission is maliciously or fraudulently repeated to allow an entity gain unauthorized access.<br>Replay Attack<\/p>\n\n\n\n<p>protocol suite provides a method of setting up a secure channel for protected data exchange between two devices.<br>Internet Protocol Security (IPSec)<\/p>\n\n\n\n<p>Juniper (block cipher)<br>MAYFLY (asymmetric)<br>FASTHASH (hashing)<br>WALBURN (high bandwith link encryption)<br>PEGASUS (satellite telemetry)<br>Class 1 Algorithms<\/p>\n\n\n\n<p>Component of a PKI that creates and maintains digital certificates throughout their life cycles.<br>Certificate Authority<\/p>\n\n\n\n<p>Uses public key encryption and provides data encryption, server authentication, message integrity, and optional client authentication.<br>It is currently at version 3.0.<br>Secure Sockets Layer (SSL)<\/p>\n\n\n\n<p>Manipulating individuals so that they will divulge confidential information, rather than by breaking in or using technical cracking techniques.<br>Social engineering attack<\/p>\n\n\n\n<p>Cryptanalysis attack where the attacker is assumed to have access only to a set of ciphertexts.<br>Ciphertext-only attack<\/p>\n\n\n\n<p>servers and software signing, for which independent verification and checking of identity and authority is done by issuing CA<br>Class 3 Certificates<\/p>\n\n\n\n<p>it should be impossible for any attacker to calculate, or otherwise guess, from any given subsequence, any previous or future values in the sequence<br>BSI Criteria K3 states<\/p>\n\n\n\n<p>Cryptanalysis attack that uses identified statistical patterns.<br>Statistical attack<\/p>\n\n\n\n<p>organizations for which proof of identity is required<br>Class 2 Certificates<\/p>\n\n\n\n<p>Block symmetric cipher that uses a 128-bit key and 64-bit block size.<br>International Data Encryption Algorithm (IDEA)<\/p>\n\n\n\n<p>individuals, and intended for email<br>Class 1 Certificates<\/p>\n\n\n\n<p>A form of cryptanalysis applicable to symmetric key algorithms that was invented by Eli Biham and Adi Shamir.<\/p>\n\n\n\n<p>The examination of differences in an input and how that affects the resultant difference in the output.<br>Differential cryptanalysis<\/p>\n\n\n\n<p>Cryptanalysis attack where the attacker is assumed to have access to sets of corresponding plaintext and ciphertext.<br>Known plaintext attack<\/p>\n\n\n\n<p>Carries out real-time validation of a certificate and reports back to the user whether the certificate is valid, invalid, or unknown.<br>OCSP checks the CRL that is maintained by the CA.<br>Online Certificate Status Protocol (OCSP)<\/p>\n\n\n\n<p>What is the formula Me%n related to?<br>Encrypting with RSA<\/p>\n\n\n\n<p>Plain-text is equal to the encryption function (E) with the key (k) and the ciphertext (c) being passed as parameters to that function<br>P= E(k,c) Symmetric decryption<\/p>\n\n\n\n<p>Not certified for government use<br>Class 4 algorithms<\/p>\n\n\n\n<p>64 bit algorithm operating at 56 bits with an 8 bit parity block<br>DES<\/p>\n\n\n\n<p>AH is the authenticating protocol, and ESP is an authenticating and encrypting protocol that uses cryptographic mechanisms to provide source authentication, confidentiality, and message integrity.<br>Authentication Header (AH) and Encapsulating Security Payload (ESP).<\/p>\n\n\n\n<p>developed as a Russian national standard and produced fixed length outputs of 256 bits<br>GOST<\/p>\n\n\n\n<p>A measure of the uncertainty associated with a random variable<br>Entropy<\/p>\n\n\n\n<p>Attempts to make the statistical frequencies of the ciphertext and actual key as complex as possible<br>Confusion<\/p>\n\n\n\n<p>Like AES, Serpent has a block size of 128 bits and can have a key size of 128, 192, or 256 bits. The algorithm is also a substitution-permutation network like AES. It uses 32 rounds working with a block of four 32-bit words. Each round applies one of eight 4-bit to 4-bit S-boxes 32 times in parallel. Designed by Ross Anderson, Eli Biham, and Lars Knudsen.<br>Serpent<\/p>\n\n\n\n<p>What is the difference between Secure HTTP (SHTTP) and HTTP Secure (HTTPS)?<br>S-HTTP is a technology that protects each message sent between two computers, while HTTPS protects the communication channel between two computers, messages and all.<\/p>\n\n\n\n<p>Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?<br>Vigenere<\/p>\n\n\n\n<p>A <strong>_<\/strong> is a function that takes a variable-size input m and returns a fixed-size string.<br>Hash<\/p>\n\n\n\n<p>A small change that yields large effects in the output.<br>Avalanche<\/p>\n\n\n\n<p>Private organizations or governmental security<br>Class 5 Certificates<\/p>\n\n\n\n<p>Numbers that have no factors in common with another.<br>Co-prime numbers<\/p>\n\n\n\n<p>Cryptanalysis attack that exploits vulnerabilities within the intrinsic algebraic structure of mathematical functions.<br>Algebraic attack<\/p>\n\n\n\n<p>Designed by Ross Anderson and Eli Biham in 1995. The size of a <strong><em>__<\/em><\/strong> hash value is 192 bits.<br>TIGER<\/p>\n\n\n\n<p>In order for User A to send User B an encrypted message that only User B can read, User A must encrypt message with which of the following keys?<br>User B&#8217;s public key<\/p>\n\n\n\n<p>Public key algorithm that can be used for digital signatures, encryption, and key exchange.<br>an extension of the Diffie-Hellman algorithm.<br>El Gamal<\/p>\n\n\n\n<p>Block symmetric cipher that was chosen to fulfill the Advanced Encryption Standard. It uses a 128-bit block size and various key lengths (128, 192, 256).<br>Rijndael<\/p>\n\n\n\n<p>Published by Siemens in 1993. A software-based stream cipher<br>using a Lagged Fibonacci generator (pseudorandom number generator).<br>FISH<\/p>\n\n\n\n<p>128 bit hash. RFC 1321<br>MD5<\/p>\n\n\n\n<p>Cipher text (C) is equal to the encryption function (E) with the key (k) and plain-text (p) being passed as parameters to that function<br>C = E(k,p) Symmetric encryption<\/p>\n\n\n\n<p>It is impossible to compress the data such that the code is less than the Shannon entropy of the source, without it being virtually certain that information will be lost<br>Shannon&#8217;s source coding theorem<\/p>\n\n\n\n<p>A non-secret binary vector used as the initializing input algorithm for<br>the encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.<br>IV (Initialization Vector)<\/p>\n\n\n\n<p>If a cryptanalysis uncovers a method that can derive a key for an algorithm, but is only slightly faster than brute force, what is this called?<br>Success<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Confidentiality<\/li>\n\n\n\n<li>Access control<\/li>\n\n\n\n<li>Integrity<\/li>\n\n\n\n<li>Authentication<\/li>\n\n\n\n<li>Nonrepudiation<br>PKI services<\/li>\n<\/ul>\n\n\n\n<p>It should be impossible for any attacker to calculate, or guess from an inner state of the generator, any previous numbers in the sequence or any previous inner generator states<br>BSI criteria K4 states:<\/p>\n\n\n\n<p>Developed by the NSA for use in the clipper chip. Skipjack uses an 80-bit key to encrypt or decrypt 64-bit data blocks.<\/p>\n\n\n\n<p>It is an unbalanced Feistel network with 32 rounds.<br>Skipjack<\/p>\n\n\n\n<p>Algorithm that was chosen for the Data Encryption Standard, which was altered and renamed Data Encryption Algorithm.<br>Lucifer<\/p>\n\n\n\n<p>Announced by NIST as FIPS 197. Has 3 key sizes: 128, 192, 256 and all operate on 128 bit block<br>AES<\/p>\n\n\n\n<p>Symmetric cipher that applies DES three times to each block of data during the encryption process.<br>Triple DES (3DES)<\/p>\n\n\n\n<p>Attack that uses information (timing, power consumption) that has been gathered to uncover sensitive data or processing functions.<br>Side-channel attack<\/p>\n\n\n\n<p>A 160 bit hash with 3 other versions: RIPEMD-128 (128 bit), RIPEMD-256 (256 bit), RIPEMD-320 (320 bit)<br>RIPEMD-160<\/p>\n\n\n\n<p>Transposition processes used in encryption functions to increase randomness.<br>Diffusion<\/p>\n\n\n\n<p>Used to store, distribute, and maintain cryptographic session and secret keys.<br>Key Distribution Center (KDC)<\/p>\n\n\n\n<p>Designed by Phil Zimmerman as a freeware e-mail security program and was released in 1991. It was the first widespread public key encryption program.<br>Pretty Good Privacy (PGP)<\/p>\n\n\n\n<p>A number that is used only one time then discarded is called what?<br>Nonce<\/p>\n\n\n\n<p>Improvement on FISH due to vulnerability to known-plaintext attacks. Published by Ross Anderson.<br>PIKE<\/p>\n\n\n\n<p>Stands for Menezes-Qu-Vanstone and is a protocol used for key agreement that is based on DH. Incorporated in public key standard IEEE P1363<br>MQV<\/p>\n\n\n\n<p>A cryptographic protocol and infrastructure developed to send encrypted credit card numbers over the Internet.<br>Secure Electronic Transaction (SET)<\/p>\n\n\n\n<p>The algorithm is used identically for encryption and decryption as the data stream is simply XORed with the key. RC4 uses a variable-length key from 1 to 2048 bits, (minimum of 40 bits or higher to be considered secure).<\/p>\n\n\n\n<p>That key constitutes a state table that is used for<br>the subsequent generation of pseudo-random bytes and then to generate<br>RC4<\/p>\n\n\n\n<p>The payload and the routing and header information are protected in this mode.<br>Tunnel mode<\/p>\n\n\n\n<p>Values that are used with algorithms to increase randomness for cryptographic functions.<br>Initialization vectors (IVs)<\/p>\n\n\n\n<p>Ticket granting service<br>TGS<\/p>\n\n\n\n<p>This is a variation of DES that XORs another 64-bit key to the plaintext before applying the DES algorithm.<\/p>\n\n\n\n<p>The concept of simply XORing in an additional key is called whitening. This adds to the confusion of the resultant text.<br>DESx<\/p>\n\n\n\n<p>The total number of co prime numbers for a number n<br>Euler&#8217;s Totient<\/p>\n\n\n\n<p>Naor-Reingold,<br>Mersenne Twister,<br>Linear Congruential Generator,<br>Lehmer Random Number Generator (twisted generalized feedback shift registers),<br>Lagged Fibonacci Generator (LFG)<br>Examples of PRNGs (pseudo random number generators)<\/p>\n\n\n\n<p>Skipjack, Key Exchange Algorithm (KEA)<br>Class 2 Algorithms<\/p>\n\n\n\n<p>Responsible for the accuracy of the information contained in a<br>certificate request. The <strong><em><strong><em>___<\/em><\/strong><\/em><\/strong> is a proxy for the CA and also expected to perform user validation before issuing a certificate request.<br>Registration authority (RA)<\/p>\n\n\n\n<p>HTTP running over SSL.<br>HTTP Secure (HTTPS)<\/p>\n\n\n\n<p>Component that keeps track of the different SAs and tells the device which one is appropriate to invoke for the different packets it receives.<br>security parameter index (SPI)<\/p>\n\n\n\n<p>Which encryption standard is used primarily for mobile devices?<br>ECC<\/p>\n\n\n\n<p>Stream symmetric cipher that was created by Ron Rivest of RSA. Used in SSL and WEP.<br>RC4<\/p>\n\n\n\n<p>256 bit and 512 bit hash<br>SHA-2<\/p>\n\n\n\n<p>Microchip installed on the motherboard of modern computers and is dedicated to carrying out security functions that involve the storage and processing of symmetric and asymmetric keys, hashes, and digital certificates.<br>Trusted Platform Module (TPM)<\/p>\n\n\n\n<p>Cryptographic hash function that uses a symmetric key value and is used for data integrity and data origin authentication.<br>Hashed message authentication code (HMAC)<\/p>\n\n\n\n<p>Type of tunneling mechanism that provides terminal-like access to remote computers. Provides authentication and secure transmission over vulnerable channels like the Internet.<br>Secure Shell (SSH)<\/p>\n\n\n\n<p>Is an authentication key agreement cryptography function very similar to Diffie-Hellman.<br>MQV (Menezes-Qu-Vanstone)<\/p>\n\n\n\n<p>Provide authentication of a sender and integrity of a sender&#8217;s message.<\/p>\n\n\n\n<p>A message is input into a hash function. Then the hash value is encrypted using the private key of the sender.<\/p>\n\n\n\n<p>The result of these two steps yields a <strong><em><strong><em>______<\/em><\/strong><\/em><\/strong>.<br>Digital Signature<\/p>\n\n\n\n<p>A 16-round Feistel cipher working on 64-bit blocks. Unlike DES, it can have varying key sizes ranging from 32 bits to 448 bits. Designed by Bruce Schneier.<br>Blowfish<\/p>\n\n\n\n<p>Which of the following modes can be used to turn a block cipher into a stream cipher?<br>Output feedback (OFB) and Counter Mode (CTR)<\/p>\n\n\n\n<p>Online business transactions between companies<br>Class 4 certificates<\/p>\n\n\n\n<p>EFS is encryption for files while Bitlocker is used for full disk encryption<br>EFS vs. Bitlocker<\/p>\n\n\n\n<p>Cryptanalysis attack that exploits vulnerabilities within the algorithm structure.<br>Analytic attack<\/p>\n\n\n\n<p>Open-community and standardized version of SSL<br>but TLS is more extensible and is backward compatible with SSL.<br>Transport-Layer Security (TLS)<\/p>\n\n\n\n<p>Uses a block size of 128 bits and key sizes up to 256 bits. It is a Feistel cipher. Designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson.<br>Twofish<\/p>\n\n\n\n<p>160 bit hash<br>SHA-1<\/p>\n\n\n\n<p>Cryptographic attack that exploits the mathematics behind the birthday problem in the probability theory forces collisions within hashing functions.<br>Birthday attack<\/p>\n\n\n\n<p>A process that puts a message into the least significant bits of a binary file is called what?<br>Steganography<\/p>\n\n\n\n<p>Cryptanalysis attack that tries to uncover a mathematical problem from two different ends.<br>Meet-in-the-middle attack<\/p>\n\n\n\n<p>Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.<br>El Gamal<\/p>\n\n\n\n<p>A combination of the ISAKMP and OAKLEY protocols.<br>Internet Key Exchange (IKE)<\/p>\n\n\n\n<p>The payload of the message is protected<br>Transport mode<\/p>\n\n\n\n<p>What did WPA replace RC4 with?<br>TKIP (Temporal Key Integrity Protocol)<\/p>\n\n\n\n<p>N denotes natural numbers. These are also sometimes called the counting numbers. They are 1, 2, 3, etc.<\/p>\n\n\n\n<p>Z denotes the integers. These are whole numbers such as -1, 0, 1, 2, etc. Basically, this set is the natural numbers combined with zero and the negative numbers.<\/p>\n\n\n\n<p>Q denotes rational numbers (or the ratios of integers). They are any number that can be expressed as a ratio of two integers. Examples are 3\/2, 17\/4, and 1\/5.<\/p>\n\n\n\n<p>R denotes real numbers. This includes the rational number as well as numbers that cannot be expressed as a ratio of two integers, such as 2\/3.<\/p>\n\n\n\n<p>i denotes imaginary numbers. These are numbers whose square is a negative. For example, \u221a-1 = 1i.<br>Explain the number groupings: N, Z, Q, R, i<\/p>\n\n\n\n<p>An encryption function for fixed-size blocks of data. The current generation has a block size of 128 bits (16 bytes).<br>block cipher<\/p>\n\n\n\n<p>To encrypt with a block cipher, we need a <strong><em><strong>_<\/strong><\/em><\/strong>.<br>secret key<\/p>\n\n\n\n<p>Don&#8217;t ever trust a <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong><em> or <strong><em><strong>_____<\/strong><\/em><\/strong><\/em>. (Kerckhoffs&#8217;s Principle)<br>secret block cipher; secret algorithm<\/p>\n\n\n\n<p>A protocol for online shopping with a credit card. One of its features is that it encrypts the credit card number so that an eavesdropper cannot copy it.<br>SET<\/p>\n\n\n\n<p><strong><em><strong><em>___<\/em><\/strong><\/em><\/strong> is the worst enemy of security, and it almost always comes in the form of features or options.<br>Complexity<\/p>\n\n\n\n<p><strong><em><strong><em>__<\/em><\/strong><\/em><\/strong> is a measure of how many things interact at any one point. If the effect of an option is limited to a small part of the program, then it cannot interact with an option whose effect is limited to another part of the program.<br>Complexity<\/p>\n\n\n\n<p>The original message, m is called the <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong>.<br>plaintext<\/p>\n\n\n\n<p>The public-key algorithms are used to establish <strong><em>_<\/em><\/strong>, which in turn is used to encrypt the actual data. This combines the flexibility of public-key cryptography with the efficiency of symmetric-key cryptography.<br>a secret key<\/p>\n\n\n\n<p>Digital signatures are the public-key equivalent of <strong><em><strong><em>__________<\/em><\/strong><\/em><\/strong>.<br>message authentication codes<\/p>\n\n\n\n<p>For practical reasons, a PKI is often set up with multiple levels of CAs. There is a top-level CA, called the <strong><em>__<\/em><\/strong>, which issues certificates on the keys of lower-level CAs, which in turn certify the user keys.<br>root<\/p>\n\n\n\n<p>A <strong><em><strong><em>________<\/em><\/strong><\/em><\/strong> is what most people mean when talking about breaking an encryption system. This is the situation in which Alice and Bob are encrypting their data, and all you as the attacker get to see is the ciphertext. Trying to decrypt a message if you only know the ciphertext is called a ciphertext-only attack. This is the most difficult type of attack, because you have the least amount of information.<br>ciphertext-only attack<\/p>\n\n\n\n<p>A <strong><em><strong><em>____<\/em><\/strong><\/em><\/strong> is one in which you know both the plaintext and the ciphertext. The most obvious goal is to find the decryption key.<br>known-plaintext attack<\/p>\n\n\n\n<p>A known-plaintext attack is more powerful than a ciphertext-only attack.<\/p>\n\n\n\n<p>A True<br>B False<br>A<\/p>\n\n\n\n<p>A <strong><em><strong><em>______<\/em><\/strong><\/em><\/strong> is any nontrivial method that detects a difference between the ideal encryption scheme and the actual one. This covers all the attacks we have discussed so far, as well as any yet-to-be-discovered attacks.<br>distinguishing attack<\/p>\n\n\n\n<p>A ____________________is an attack that depends on the fact that duplicate values, also called collisions, appear much faster than you would expect.<br>Birthday attack<\/p>\n\n\n\n<p>An <strong><em><strong><em>______<\/em><\/strong><\/em><\/strong> attack is one that tries all possible values for some target object, like the key. If an attack requires 2^235 steps of work, then this corresponds to an exhaustive search for a 235-bit value.<br>exhaustive search<\/p>\n\n\n\n<p>First introduced by Eli Biham in 1993, a <strong><em><strong>_<\/strong><\/em><\/strong> attack assumes that the attacker has access to several encryption functions. These functions all have an unknown key, but their keys have a relationship that the attacker knows.<br>related-key<\/p>\n\n\n\n<p>A <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong> cipher is one for which no attack exists.<br>secure block<\/p>\n\n\n\n<p>An attack on a block cipher is a non-generic method of distinguishing the block cipher from an <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong> cipher.<br>ideal block<\/p>\n\n\n\n<p>Most modern block ciphers have a <strong><em>__<\/em><\/strong> block size, but they operate on 32-bit words.<br>128-bit<\/p>\n\n\n\n<p>An <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong> cipher implements an independently chosen random even permutation for each of the key values.<br>ideal block<\/p>\n\n\n\n<p>The simplest method to encrypt a longer plaintext is known as the <strong><em><strong><em>___________<\/em><\/strong><\/em><\/strong>. It has serious weakness, therefore, do not use this method.<br>electronic codebook mode (ECB)<\/p>\n\n\n\n<p><strong><em><strong><em>_________<\/em><\/strong><\/em><\/strong> was a cylinder tool used by the Greeks, and is often specifically attributed to the Spartans. It was a physical cylinder that was used to encrypt messages. Turning the cylinder produced different ciphertexts. While it is not clear exactly how old this cipher is, it was first mentioned in the 7th century BC by the Greek poet Archilochus. The recipient uses a rod of the same diameter as the one used to create the message. He then wraps the parchment to read the message. To encrypt, one simply writes across the leather.<br>Scytale<\/p>\n\n\n\n<p>Caesar Cipher &#8211; Every letter is shifted a fixed number of spaces to the left or the right in the alphabet. The reason it is easy to crack is the issue of letter and word frequency.<\/p>\n\n\n\n<p>Atbash Cipher &#8211; is a Hebrew code, easier to crack than Caesar, which substitutes the first letter of the alphabet for the last and the second letter for the second to the last, etc. It simply reverses the alphabet Used by Hebrew scribes copying the book of Jeremiah. Example: A becomes Z, B becomes Y, C becomes X, etc.<\/p>\n\n\n\n<p>Affine Cipher &#8211; is any single-substitution alphabet cipher (also called mono-alphabet substitution) in which each letter in the alphabet is mapped to some numeric value, permuted with some relatively simple mathematical function, and then converted back to a letter. The formula for Affine is: ax + b (mod M). M=26, x=Plaintext numerical equivalent, b=the shift, a=some multiple. For Caesar a=1.<\/p>\n\n\n\n<p>Rot13 Cipher &#8211; is another single alphabet substitution cipher. It is, in fact, the simplest of all of them. It is really just a permutation of the Caesar cipher. All characters are rotated 13 characters through the alphabet.<br>Examples of Mono-Alphabet Substitution<\/p>\n\n\n\n<p>Homophonic substitution was one of the earlier attempts to make substitution ciphers more robust by_________ the letter frequencies.<br>masking<\/p>\n\n\n\n<p>In World War II, the Germans used this as an electromechanical rotor-based cipher system. The machine was designed so that when the operator pressed a key, the encrypted ciphertext for that plaintext was altered each time. So, if the operator pressed the A key, he or she might generate an F in the ciphertext, and the next time, it might be a D. Essentially, this was a multi-alphabet cipher consisting of 26 possible alphabets.<br>The Enigma Machine<\/p>\n\n\n\n<p>Cipher Disk &#8211; The cipher disk, like Scytale, is a physical device used to encrypt. The cipher disk was invented by Leon Alberti in 1466. The cipher disk was polyalphabetic; each time you turned the disk, you used a new cipher. It was literally a disk you turned to encrypt plaintext.<\/p>\n\n\n\n<p>Vigen\u00e8re Cipher &#8211; is perhaps the most widely known multi-alphabet substitution cipher. At one time, multi-alphabet substitution was considered quite secure. In fact, the Vigen\u00e8re cipher was used in the 1800s and early 1900s. The Vigen\u00e8re cipher was invented in 1553 by Giovan Battista Bellaso. It is a method of encrypting alphabetic text by using a series of different Caesar ciphers based on the letters of a keyword. This is a very effective multi-alphabet cipher and prior to the advent of computers was considered quite strong. It should be noted that the longer the keyword, the more alphabets used to encrypt the message, and thus the stronger the encryption. In fact, one does not even need to use a real word. Any series of letters will work. In 1863, Friedrich Kasiski was the first person to publish a successful general attack on the Vigen\u00e8re cipher.<\/p>\n\n\n\n<p>Playfair Cipher &#8211; invented in 1854 by Charles Wheatstone. It was named after Lord Playfair who promoted the use of the cipher. uses a five-by-five table containing a keyword or key phrase. To generate the key table, one would first fill in the spaces in the table with the letters of the keyword (dropping any duplicate letters), then fill the remaining spaces with the rest of the letters of the alphabet in order. People often omitted Q from the list. To encrypt a message, you would break the message into groups of two letters. For example, &#8220;CheeseBurger&#8221; becomes &#8220;Ch ee se Bu rg er&#8221;, and then you would be map out on the key table. If both letters are the same (or only one letter is left), add an &#8220;X&#8221; after the first letter. Encrypt the new pair and continue. If the letters appear on the same row of your table, replace them with the letters to their immediate right. If the letters appear on the same column of your table, replace them with the letters immediately below.<\/p>\n\n\n\n<p>ADFGVX Cipher &#8211; This was the first cipher used by the German Army during World War I. It was invented by Colonel Fritz Nebel in 1918. This was a transposition cipher which used a modified Polybius square with a single columnar transposition used to encode a 36-letter alphabet. This was actually an extension of an earlier cipher called ADFGX. The key for this algorithm is a six-by-six square of letters. This is known as a Polybius square. It is comprised of the letters of the alphabet and the numbers 0 through 9 distributed randomly in the square. The letters A, D, F, G, V, and X are used as coordinates for the square.<br>Examples of poly-alphabetic substitution<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> allows you to enter in any text, choose the historic algorithm you wish to use, then encrypt that text in a matter of seconds.<br>CrypTool<\/p>\n\n\n\n<p>Many experts believe that modern cryptography begins with <strong><em><strong><em>_________<\/em><\/strong><\/em><\/strong> In 1949 he published a paper in the in the Bell System Technical Journal entitled Communication Theory of Secrecy Systems Shortly thereafter he and Warren Weaver published a book entitled Mathematical Theory of Communication<br>Claude Shannon<\/p>\n\n\n\n<p>Changes to one character in the plain text affect multiple characters in the ciphertext, unlike in historical algorithms (Caesar cipher, ATBASH, Vigen\u00e8re) where each plain text character only affects one ciphertext character.<br>Diffusion<\/p>\n\n\n\n<p>Attempts to make the relationship between the statistical frequencies of the ciphertext and the actual key as complex as possible by using a complex substitution algorithm.<br>Confusion<\/p>\n\n\n\n<p>This term means that a small change yields large effects in the output, like an avalanche. This is Fiestel&#8217;s variation on Claude Shannon&#8217;s concept of diffusion. We will see Fiestel&#8217;s ideas used in many of the block ciphers we explore in this module.<br>Avalanche<\/p>\n\n\n\n<p>Symmetric algorithm encryption<br>C = E(k,p)<\/p>\n\n\n\n<p>Symmetric algorithm decryption<br>P = D(k,c)<\/p>\n\n\n\n<p>To perform the binary <strong>_<\/strong> operation, you take two binary numbers and compare them one place at a time. If both numbers have a one in both places, then the resultant number is a one. If not, then the resultant number is a zero.<br>AND<\/p>\n\n\n\n<p>The binary <strong>__<\/strong> operation checks to see whether there is a one in either or both numbers in a given place. If so, then the resultant number is one. If not, the resultant number is zero.<br>OR<\/p>\n\n\n\n<p>The binary <strong>__<\/strong> operation impacts your study of encryption the most. It checks to see whether there is a one in a number in a given place, but not in both numbers at that place. If it is in one number but not the other, then the resultant number is one. If not, the resultant number is zero. It has a very interesting property in that it is reversible.<br>XOR<\/p>\n\n\n\n<p>Most symmetric ciphers use_________ as part of their process<br>XORing<\/p>\n\n\n\n<p>There are two types of symmetric algorithms. They are <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong> and <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong>. A block cipher literally encrypts the data in blocks. 64-bit blocks are quite common, although some algorithms (like AES) use larger blocks. For example, AES uses a 128-bit block. Stream ciphers encrypt the data as a stream, one bit at a time.<br>block ciphers; stream ciphers<\/p>\n\n\n\n<p>The algorithm(s) needed to encrypt and decrypt a message.<br>Cipher<\/p>\n\n\n\n<p>The random bits used in encrypting a message.<br>Key<\/p>\n\n\n\n<p>The mathematical process used to alter a message and read it unintelligible by any but the intended party.<br>Algorithm<\/p>\n\n\n\n<p>The Feistel Network<br>DES<br>3DES<br>AES<br>Blowfish<br>Serpent<br>Twofish<br>Skipjack<br>IDEA<br>CAST<br>TEA<br>SHARK<br>Symmetric Block Cipher Algorithms<\/p>\n\n\n\n<p>Refers to the generation of sub keys from a single key.<br>Key schedule<\/p>\n\n\n\n<p>Larger block sizes increase security.<br>Larger key sizes increase security.<br>If the round function is secure, then more rounds increase security.<\/p>\n\n\n\n<p>A True<br>B False<br>A<\/p>\n\n\n\n<p>This function is named after its inventor, the German-born physicist and cryptographer Horst Feistel. At the heart of many block ciphers is a Feistel function. So this makes it a good place to start with study of symmetric algorithms. This function forms the basis for many, if not most, block ciphers. This function starts by splitting the block of plaintext data (often 64 bits) into two parts (traditionally termed L0 and R0). Usually, the split is equal, and both sides are the same size.<br>The Feistel Function<\/p>\n\n\n\n<p>A variation of the Feistel network called an <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong> cipher. They use a modified structure where L0 and R0 are not of equal lengths. This means that L0 might be 32 bits and R0 could be 64 bits (making a 96-bit block of text). This variation is actually used in the Skipjack algorithm.<br>Unbalanced Feistel<\/p>\n\n\n\n<p>One of the oldest of the modern symmetric ciphers is________. It was a block cipher developed by IBM in the early 1970s and used as a U.S. government standard until the 1990s. IBM had originally developed a cipher called Lucifer, which was designed by Horst Feistel. When the U.S. government began seeking a standardized encryption algorithm, IBM worked with the National Security Agency (NSA) to alter Lucifer to fit the government&#8217;s needs, thus it was created. As you may guess, it is a Feistel cipher.<br>DES<\/p>\n\n\n\n<p>This is a variation of DES that simply XORs another 64-bit key to the plaintext before applying the DES algorithm.<br>DESx<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> is designated as FIPS 197 and can have three different key sizes. They are: 128, 192, or 256 bits. This algorithm was developed by two Belgian cryptographers, Joan Daemen and Vincent Rijmen. Unlike both DES and 3DES, it is not based on a Feistel network. This algorithm uses a substitution-permutation matrix rather than a Feistel network. It also operates on a four-by-four column-major order matrix of bytes, called the state.<br>AES<\/p>\n\n\n\n<p>In the SubBytes step, each byte in the matrix is substituted for another byte using an 8-bit substitution box, called the <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong>.<br>Rijndael S-box<\/p>\n\n\n\n<p><strong><em>__<\/em><\/strong> is a symmetric block cipher that was designed in 1993 by Bruce Schneier. This cryptography algorithm is intended as a replacement for DES. Like DES, it is a 16-round Feistel cipher working on 64-bit blocks. However, unlike DES, it can have varying key sizes ranging from 32 bits to 448 bits. There are really two parts to this algorithm. The first part handles the expansion of the key. The second part actually encrypts the data. The key expansion is handled in several steps. The first step is to break the original key into a set of subkeys. Specifically, a key of no more than 448 bits is separated into 4,168 bytes. There is a P-array and four 32-bit S-boxes. The P-array contains 18 32-bit subkeys, while each S-box contains 256 entries.<br>Blowfish<\/p>\n\n\n\n<p>Like Blowfish, <strong><em>_<\/em><\/strong> is a symmetric key block cipher which was a finalist in the AES contest. This algorithm was designed by Ross Anderson, Eli Biham, and Lars Knudsen. It has a block size of 128 bits and can have a key size of 128, 192, or 256 bits, much like AES. The algorithm is also a substitution-permutation network like AES. It uses 32 rounds working with a block of four 32-bit words. Each round applies one of eight 4-bit to 4-bit S-boxes 32 times in parallel. It was designed so that all operations can be executed in parallel.<br>Serpent<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> uses a block size of 128 bits and key sizes up to 256 bits. It is a Feistel cipher. It was designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson.<br>Twofish<\/p>\n\n\n\n<p>Designed by NSA for the clipper chip, <strong><em><strong>_<\/strong><\/em><\/strong> uses an 80-bit key to encrypt or decrypt 64-bit data blocks. It is an unbalanced Feistel network with 32 rounds.<br>Skipjack<\/p>\n\n\n\n<p>The_________________ is a block cipher. The algorithm was published in 1991 and was designed by James Massey and Xuejia Lai. It operates on 64-bit blocks and has a 128-bit key. The algorithm consists of a series of eight identical transformations (each round) and an output transformation. It was designed as a replacement for DES.<br>International Data Encryption Algorithm (IDEA)<\/p>\n\n\n\n<p><strong><em><strong><em>____<\/em><\/strong><\/em><\/strong> was created by David Wheeler and Roger Needham and first publicly presented in 1994. It is a simple algorithm, easy to implement in code. It is a Feistel cipher that uses 64 rounds (note this is a suggestion, it can be implemented with fewer or more rounds). The rounds should be even since they are implemented in pairs called, cycles. it uses a 128-bit key operating on a 64-bit block. It also uses a constant that is defined as 232\/the golden ratio.<br>TEA, or Tiny Encryption Algorithm<\/p>\n\n\n\n<p><strong><em><strong>_<\/strong><\/em><\/strong> was invented by a team of cryptographers including Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, and Erik De Win. It uses a 64-bit block with a 128-bit key and operates in six rounds.<br>SHARK<\/p>\n\n\n\n<p>The most basic encryption mode is the <strong><em><strong><em>_____<\/em><\/strong><\/em><\/strong>. The message is divided into blocks and each block is encrypted separately.<br>electronic codebook (ECB) mode<\/p>\n\n\n\n<p>When using <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong> mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This means there is significantly more randomness in the final ciphertext. This is much more secure than electronic codebook mode and is the most common mode.<br>cipher-block chaining (CBC)<\/p>\n\n\n\n<p>In <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong>, the previous ciphertext block is encrypted then the ciphertext produced is XORed back with the plaintext to produce the current ciphertext block. Essentially it loops back on itself, increasing the randomness of the resultant ciphertext.<\/p>\n\n\n\n<p>Allows encryption of partial blocks rather than requiring full blocks<br>for encryption. This eliminates the need to pad a block like in CBC.<br>cipher feedback mode (CFB)<\/p>\n\n\n\n<p>The <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong> mode turns a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.<br>output feedback (OFB)<\/p>\n\n\n\n<p><strong><em><strong><em>______<\/em><\/strong><\/em><\/strong>) is also used to turn a block cipher into a stream cipher. This is much like OFB mode. CTR generates the next keystream block by encrypting successive values of a &#8220;counter.&#8221; The counter can be any simple function that produces a sequence that is guaranteed not to repeat for a long time.<br>Counter mode (CTR<\/p>\n\n\n\n<p>An <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong> is a fixed-size input to a cryptographic primitive that is random or pseudo-random. It is added to a cryptographic algorithm and key in order to increase the randomness of the resultant cipher text.<br>initialization vector (IV)<\/p>\n\n\n\n<p>Stream ciphers are also sometimes called <strong><em>__<\/em><\/strong> ciphers.<br>state<\/p>\n\n\n\n<p>Ron Rivest created this algorithm in 1987 and it stands for Ron&#8217;s Cipher. It is the most widely used software stream cipher. The algorithm is used identically for encryption and decryption as the data stream is simply XORed with the key. It uses a variable length key from 1 to 256 bytes. That key constitutes a state table that is used for subsequent generation of pseudo-random bytes and then to generate a pseudo-random stream which is XORed with the plaintext to produce the ciphertext. It generates a pseudo-random stream of bits.<br>RC4<\/p>\n\n\n\n<p>Published by the German engineering firm Seimans in 1993 The__________ (FIbonacci SHrinking) cipher is a software-based stream cipher using the Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers<br>FISH<\/p>\n\n\n\n<p>This algorithm was published in a paper by Ross Anderson as an improvement on FISH. Anderson showed that Fish was vulnerable to known plaintext attacks. It is both faster and stronger than FISH.<br>PIKE<\/p>\n\n\n\n<p>A <strong><em>_<\/em><\/strong> function H is a function that takes a variable-size input m and returns a fixed-size string. The value that is returned is called the hash value h or the digest. This can be expressed mathematically as h = H(m). An example of this is Windows will store that in the Security Accounts Manager (SAM) file in the Windows System directory. When you log on, Windows cannot &#8220;un-hash: your password (remember it is one way). So, what Windows does is take whatever password you type in, hash it, then compare the result with what is in the SAM file. If they match (exactly), then you can log in.<br>hash<\/p>\n\n\n\n<p>In relationship to hashing, the term &#8220;<strong><em>__<\/em><\/strong>&#8221; refers to random bits that are used as one of the inputs to the hash. Furthermore, it complicates dictionary attacks that use pre-encryption of dictionary entries. It also is very effective against rainbow table attacks.<br>salt<\/p>\n\n\n\n<p>This is a 160-bit hash function which resembles the earlier MD5 algorithm. This was designed by the NSA to be part of the digital signature algorithm.<br>SHA-1<\/p>\n\n\n\n<p>This is actually two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-byte (256 bit) words where SHA-512 uses 64-byte (512 bit) words. There are also truncated versions of each standardized, known as SHA-224 and SHA-384. These were also designed by the NSA.<br>SHA-2<\/p>\n\n\n\n<p>This is a proposed hash function standard still in development. This is being chosen in a public review process from non-government designers. An ongoing NIST hash function competition is scheduled to end with the selection of a winning function, which will be given the name SHA-3 in 2012.<br>SHA-3<\/p>\n\n\n\n<p>This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged. Because the four branches are used in parallel, whereas SHA-256 uses four serial rounds, <strong><em><strong>__<\/strong><\/em><\/strong> is hard to analyze.<br>FORK-256<\/p>\n\n\n\n<p><strong><em><strong><em>________________<\/em><\/strong><\/em><\/strong> is a 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel. There exist 128-, 256-, and 320-bit versions of this algorithm, called RIPEMD-128, RIPEMD-256, and RIPEMD-320, respectively. These all replace the original RIPEMD which was found to have collision issues. The larger bit sizes make this far more secure that MD5 or RIPEMD.<br>RACE Integrity Primitives Evaluation Message Digest (RIPEMD-160)<\/p>\n\n\n\n<p>The input message is broken into 512-byte chunks (16-32 bit integers).<br>The message is padded with zeros if needed to reach 512-byte chunks.<br>The length of the message (before padding) is then appended as the last 64 bits of the message.<br>The algorithm operates on a 128-bit state, divided into four 32-bit words, denoted A, B, C, and D. They are initialized to an initial variable.<br>The algorithm consists of four stages or rounds, each of which consists of 16 similar operations.<br>Those operations are a non-linear function F, a modular operation, and a shift.<br>The MD5 Algorithm<\/p>\n\n\n\n<p>This hash algorithm was initially defined in the Russian national standard and produces a fixed-length output of 256 bits. The input message is broken up into chunks of 256-bit blocks. If a block is less than 256 bits, then the message is padded by appending as many zeros to it as are required to bring the length of the message up to 256 bits. The remaining bits are filled up with a 256-bit integer arithmetic sum of all previously hashed blocks and then a 256-bit integer representing the length of the original message, in bits, is produced.<br>GOST<\/p>\n\n\n\n<p>This hash function was designed by Ross Anderson and Eli Biham in 1995 and is 192 bits. It is designed using the Merkle-Damg\u00e5rd construction (sometimes call the Merkle-Damg\u00e5rd paradigm). This is a method to build collision-resistant cryptographic hash functions from collision-resistant one-way compression functions. The Merkle-Damg\u00e5rd construction was described in Ralph Merkle&#8217;s Ph.D. dissertation in 1979.<br>TIGER<\/p>\n\n\n\n<p>An <strong><em><strong><em>____________<\/em><\/strong><\/em><\/strong> adds a key to a hash to improve integrity.<br>HMAC or Hash Message Authentication Code<\/p>\n\n\n\n<p>A <strong><em><strong><em>______<\/em><\/strong><\/em><\/strong>, uses a block cipher in CBC mode to improve integrity.<br>MAC or Message Authentication Code<\/p>\n\n\n\n<p>In PKI, Bob encrypts the message with Alice&#8217;s <strong><em><strong><em>___<\/em><\/strong><\/em><\/strong> and sends it. When Alice receives the message, they can decrypt it with her <strong><em><strong><em>____<\/em><\/strong><\/em><\/strong>.<br>public key; private key<\/p>\n\n\n\n<p>In information theory,<strong><em>__<\/em><\/strong> is a measure of the uncertainty associated with a random variable.<br>entropy<\/p>\n\n\n\n<p>Related to entropy, <strong><em><strong><em>____<\/em><\/strong><\/em><\/strong> states: it is impossible to compress the data such that the code rate is less than the Shannon entropy of the source, without it being virtually certain that information will be lost.<br>Shannon&#8217;s source coding theorem<\/p>\n\n\n\n<p>Mn &#8211; 2^(n) -1<\/p>\n\n\n\n<p>Where n is a prime number<br>Works for n 2, 3, 5, 7 but fails on n = 11 and on many other n value<br>Mersenne Primes<\/p>\n\n\n\n<p>Fn = 2^(2n) + 1<\/p>\n\n\n\n<p>So, F1 = 221 + 1 or 5<br>However, F5 is not prime<br>Fermat Numbers<\/p>\n\n\n\n<p>A <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong> is a number that has no factors in common with another number.<br>co-prime<\/p>\n\n\n\n<p>The number of positive integers less than or equal to n that are co-prime to n is called the <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong> of n.<\/p>\n\n\n\n<p>So for the number 6, 4 and 5 are co-prime with 6. Therefore, <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong> = 2.<br>Euler&#8217;s totient<\/p>\n\n\n\n<p>With just 23 people in the room, you have a 50 percent chance that 2 will have the same birthday.<br>Birthday Paradox<\/p>\n\n\n\n<p>The idea of the <strong><em><strong><em>______<\/em><\/strong><\/em><\/strong> is to attempt to find a collision for a given hash. Now assume the hash is MD5, with a 128-bit output. You would have to try 2^128 possible hashes to guarantee a collision. That is a very large number. In decimal notation that is 3.4028236692093846346337460743177e+38<\/p>\n\n\n\n<p>Now from the birthday paradox we know that we actually need about 1.174\u221a2^128 or 21656477542535013597.184.<br>Birthday Attack<\/p>\n\n\n\n<p>Developed and published by Whitfield Diffieand Martin Hellman in 1976, <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong> is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel. It was the first publically described asymmetric algorithm and is often used for the key exchange of symmetric keys.<br>Diffie-Hellman<\/p>\n\n\n\n<p>This algorithm was first described in 1985 by Victor Miller (IBM) and Neil Koblitz (University of Washington).<\/p>\n\n\n\n<p>It is based on equations of the form: y2 = x3 + Ax + B<br>Elliptic Curve Cryptography<\/p>\n\n\n\n<p>This algorithm is based on Diffie-Hellman and was invented in 1984 by Taher Elgamal. It is used in some PGP implementations as well as GNU Privacy Guard software.<\/p>\n\n\n\n<p>The algorithm consists of three parts:<br>the key generator,<br>the encryption algorithm,<br>and<br>the decryption algorithm.<br>Elgamal<\/p>\n\n\n\n<p>FIPS 140 covers what?<br>Cryptographic Modules<\/p>\n\n\n\n<p>FIPS 186 covers what?<br>Digital Signatures<\/p>\n\n\n\n<p>FIPS 197 covers what?<br>AES<\/p>\n\n\n\n<p>Table look-up<br>Hardware<br>Algorithmic (software)<br>The 3 Types of Generators<\/p>\n\n\n\n<p>FIPS 201 covers what?<br>Identity Verification<\/p>\n\n\n\n<p>What provides all 3 of the following?<\/p>\n\n\n\n<p>-Authentication<br>-Integrity<br>-Non-repudiatio<br>Good digital signature schemes<\/p>\n\n\n\n<p>A <strong><em><strong><em>_______<\/em><\/strong><\/em><\/strong> is an entity trusted by one or more users to manage certificates<br>CA (Certification Authority)<\/p>\n\n\n\n<p>A <strong><em><strong><em>_______<\/em><\/strong><\/em><\/strong> is used to take the burden off of a CA by handling verification prior to certificates being issued. It acts as a proxy between a user and CA and it receives a request, authenticates it and forwards it to the CA.<br>RA (Registration Authority)<\/p>\n\n\n\n<p>A <strong><em><strong><em>_____<\/em><\/strong><\/em><\/strong> is a set of rules that defines how a certificate may be used.<br>CP (Certificate Policy)<\/p>\n\n\n\n<p><strong><em>__<\/em><\/strong> is an international standard for the format and information contained in a digital certificate and is the most common type of digital certificate in the world. It was first issued on July 3, 1988. It is a digital document that contains a public key signed by the trusted third party, which is known as a Certificate Authority, or CA. Relied on by S\/MIME, it contains your name, info about you, and signature of the person who issued the certificate.<br>X.509<\/p>\n\n\n\n<p>HTTPS means <strong><em><strong><em>_____<\/em><\/strong><\/em><\/strong> with either SSL (older) or TLS (newer). The certificate must be installed on the web server for the website to use it.<br>HTTP secured<\/p>\n\n\n\n<p><strong><em><strong><em>___<\/em><\/strong><\/em><\/strong> is the simplest form of authentication where the user&#8217;s name and password are transmitted over a network and compared to a table of name-password pairs. Typically, the passwords stored in the table are encrypted; however, the transmissions of the passwords are in cleartext, unencrypted. This is it&#8217;s main weakness. The Basic Authentication feature built into HTTP uses this form of authentication.<br>Password Authentication Protocol (PAP)<\/p>\n\n\n\n<p><strong><em><strong><em>________________<\/em><\/strong><\/em><\/strong> calculates a hash after the user has logged in, then it shares that hash with the client system. Periodically, the server will ask the client to provide that hash (this is the challenge part). If the client cannot, then it is clear that the communications have been compromised.<br>Challenge HandShake Authentication Protocol (CHAP)<\/p>\n\n\n\n<p>____________is used widely, particularly with Microsoft operating systems. It was invented at MIT and derives its name from the mythical three-headed dog that was reputed to guard the gates of Hades. The client authenticates to the authentication server once using a long-term shared secret (e.g. a password) and receives a ticket-granting server from the authentication server.<\/p>\n\n\n\n<p>The tickets are time-stamped. This allows you to make additional requests using the same ticket within a certain time period (typically, eight hours).<\/p>\n\n\n\n<p>Uses symmetric cryptography<\/p>\n\n\n\n<p>Authentication is UDP port 88<br>Kerberos<\/p>\n\n\n\n<p>A server or client that Kerberos can assign tickets to. Basically, any machine that can be assigned tickets is known as a <strong><em><strong><em>_________<\/em><\/strong><\/em><\/strong>.<br>Principal<\/p>\n\n\n\n<p>A server that authorizes the principal and connects them to the ticket granting server.<br>Authentication Server (AS)<\/p>\n\n\n\n<p>Provides tickets<br>Ticket Granting Server (TGS)<\/p>\n\n\n\n<p>The ticket that is granted during the authentication process.<br>Ticket Granting Ticket (TGT)<\/p>\n\n\n\n<p>Used to authenticate to the server. Contains the identity of the client, the session key, the timestamp, and the checksum. It is encrypted with the server&#8217;s key.<br>Ticket<\/p>\n\n\n\n<p><strong><em><strong>__<\/strong><\/em><\/strong> uses the stream cipher RC4 (128 bit or 256 bit). For a 24-bit IV, there is a 50% probability the same IV will repeat after 5000 packets<br>WEP (Wired Equivalent Privacy)<\/p>\n\n\n\n<p><strong>_<\/strong> was developed by Netscape and has since been supplanted by TLS. It was the preferred method used with secure websites (i.e. https).<br>SSL<\/p>\n\n\n\n<p><strong><em><strong><em>_____<\/em><\/strong><\/em><\/strong> is a protocol for encrypting transmissions. A client and server negotiate a connection by using a handshaking procedure, in which the client and server agree on various parameters used to establish the connection&#8217;s security.<br>Transport Layer Security (TLS)<\/p>\n\n\n\n<p>Microsoft provides a system for encrypting partitions or entire hard drives using a Trusted Platform Module (TPM). By default, it uses the AES encryption algorithm with a 128-bit key.<br>Bitlocker<\/p>\n\n\n\n<p><strong><em><strong><em>_____<\/em><\/strong><\/em><\/strong> is the art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. It is a form of security through obscurity. By altering the least significant bit, one can hide additional data without altering the original file in any noticeable way.<br>Steganography<\/p>\n\n\n\n<p>Payload &#8211; The data to be covertly communicated, the message you wish to hide<\/p>\n\n\n\n<p>Carrier &#8211; The signal, stream, or data file into which the payload is hidden<\/p>\n\n\n\n<p>Channel &#8211; The type of medium used. This may be still photos, video, or sound files<br>Steganography Terms<\/p>\n\n\n\n<p>The most common steganography method is <strong><em><strong><em>_________<\/em><\/strong><\/em><\/strong>.<br>Least Significant Bits (LSB)<\/p>\n\n\n\n<p>This method of Audio Steganography (Steganophony) adds an extra sound to an echo inside an audio file, that extra sound conceals information.<br>Echo hiding<\/p>\n\n\n\n<p>The NSA classifies Suite A cryptographies as published, while Suite B as not published. NSA Suite A cryptography contains classified algorithms that will not be released. These algorithms are used to encrypt especially sensitive information. Suite B are publically described algorithms.<\/p>\n\n\n\n<p>A True<br>B False<br>A<\/p>\n\n\n\n<p>This is the most basic tool for breaking most classical ciphers. In natural languages, certain letters of the alphabet appear more frequently than others. By examining those frequencies, you can derive some information about the key that was used. This method is very effective against classic ciphers like Caesar, Vigen\u00e8re, etc. It is far less effective against modern methods.<br>Frequency Analysis<\/p>\n\n\n\n<p>In a <strong><em><strong><em>________<\/em><\/strong><\/em><\/strong>, the attacker obtains the ciphertexts corresponding to a set of plaintexts. This can allow the attacker to attempt to derive the key used and thus decrypt other messages<br>encrypted with that key.<br>Chosen plaintext attack<\/p>\n\n\n\n<p>A <strong><em><strong><em>________<\/em><\/strong><\/em><\/strong> is less effective, but much more likely for the attacker since the attacker only has access to a collection of ciphertexts.<\/p>\n\n\n\n<p>NOTE: The attacker ONLY has access to the ciphertext of messages.<br>Ciphertext-only attack<\/p>\n\n\n\n<p>The <strong><em><strong><em>______<\/em><\/strong><\/em><\/strong> is similar to the chosen-plaintext attack, except the attacker can obtain ciphertexts encrypted under two different keys. (the keys need to be related, meaning that one was derived from the other as is the case in wireless systems)<br>Related-key attack<\/p>\n\n\n\n<p>A known-plaintext attack and uses a linear approximation to describe the behavior of the block cipher.<\/p>\n\n\n\n<p>Given sufficient pairs of plaintext and corresponding ciphertext, bits of information about the key can be obtained and increased amounts of data will usually give a higher probability of success.<\/p>\n\n\n\n<p>Invented by Mitsarue Matsui.<br>Linear Cryptanalysis<\/p>\n\n\n\n<p><strong><em><strong><em>______<\/em><\/strong><\/em><\/strong> is a form of cryptanalysis applicable to symmetric key algorithms and was invented by Eli Biham and Adi Shamir.<\/p>\n\n\n\n<p>Essentially, it is the examination of differences in an input and how that affects the resultant difference in the output. It originally worked only with chosen plaintext.<\/p>\n\n\n\n<p>It could also work with known plaintext and ciphertext.<br>Differential cryptanalysis<\/p>\n\n\n\n<p>Similar to Differential Cryptanalysis, but uses a different technique.<\/p>\n\n\n\n<p>Uses sets or even multisets of chosen plaintexts of which part is held constant and another part varies through all possibilities.<br>Integral cryptanalysis<\/p>\n\n\n\n<p>The attacker deduces the secret key.<br>Total break<\/p>\n\n\n\n<p>The attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.<br>Global deduction<\/p>\n\n\n\n<p>The attacker discovers additional plaintexts (or ciphertexts) not previously known.<br>Instance (local) deduction<\/p>\n\n\n\n<p>The attacker gains some Shannon information about plaintexts (or ciphertexts) not previously known.<br>Information deduction<\/p>\n\n\n\n<p>The attacker can distinguish the cipher from a random permutation.<br>Distinguishing algorithm<\/p>\n\n\n\n<p>In 1980, Martin Hellman described a cryptanalytic time-memory trade-off which reduces the time of cryptanalysis by using pre-calculated data stored in memory.<\/p>\n\n\n\n<p>Essentially, these types of password crackers are working with pre-calculated hashes of all passwords available within a certain character space, be that a-z, or a-zA-z, or a-zA-Z0-9, etc.<\/p>\n\n\n\n<p>These files are called <strong><em><strong><em>_______<\/em><\/strong><\/em><\/strong>. They are particularly useful when trying to crack hashes. Since a hash is a one-way function, the way to break it is to attempt to find a match.<\/p>\n\n\n\n<p>The attacker takes the hashed value and searches the rainbow tables seeking a match to the hash. If one is found, then the original text for the hash is found.<\/p>\n\n\n\n<p>A popular hacking tool is Ophcrack.<br>Rainbow Tables<\/p>\n\n\n\n<p>Windows stores passwords as a hash in a file called a <strong>_<\/strong> file. As you should know by now, a hash cannot be un-hashed. However, as you have seen, Rainbow Tables can be used to look up the matching password.<br>SAM<\/p>\n\n\n\n<p>Time &#8211; The number of &#8220;primitive operations&#8221; which must be performed. This is quite loose; primitive operations could be basic computer instructions, such as addition, XOR, shift, and so forth, or entire encryption methods.<\/p>\n\n\n\n<p>Memory &#8211; The amount of storage required to perform the attack.<\/p>\n\n\n\n<p>Data &#8211; The quantity of plaintexts and ciphertexts required.<br>The 3 resources for cryptanalysis<\/p>\n\n\n\n<p>A one-way mathematical operation that reduces a message or data file into a smaller fixed length output, or hash value.<\/p>\n\n\n\n<p>Variable data input (of any size) + hashing algorithm = fixed bit stream output (hash value)<\/p>\n\n\n\n<p>MD5 = 128 bits<br>SHA1 = 160 bits<br>Hash Function<\/p>\n\n\n\n<p>Different encryption keys generate the same ciphertext from the same plaintext message.<br>Key clustering<\/p>\n\n\n\n<p>The time and effort required to break a protective measure.<br>Work factor<\/p>\n\n\n\n<p>Each block of plaintext is XORed with the XOR of the previous plaintext block and the previous ciphertext block before being encrypted. As with CBC mode, an initialization vector is used in the first block.<br>Propagating Cipher Block Chaining (PCBC)<\/p>\n\n\n\n<p>A number that has no factors in common with another number (3 &amp; 7)<br>Co-prime numbers<\/p>\n\n\n\n<p>Developed in 1977 by three mathematicians, Ron Rivest, Adi Shamir, and Len Adleman.<\/p>\n\n\n\n<p>Based on the practical difficulty of factoring the product of two large prime numbers.<\/p>\n\n\n\n<p>Key sizes are typically from 1,024 &#8211; 4,096 bits.<br>RSA<\/p>\n\n\n\n<p>Works at Layer 2 of the OSI model.<\/p>\n\n\n\n<p>Offers the ability to encrypt and authenticate. Uses EAP and\/or CHAP to authenticate. Uses Microsoft Point to Point Encryption (MPPE) for encryption. (MPPE is a derived version of DES).<\/p>\n\n\n\n<p>ONLY works over standard IP Networks.<br>Point to Point Tunneling Protocol (PPTP)<\/p>\n\n\n\n<p>Works at Layer 2 of the OSI model. Combination of PPTP<br>and Cisco&#8217;s Layer 2 Forwarding Protocol (L2F). Offers additional methods for authentication;<\/p>\n\n\n\n<p>PPTP offers two, whereas L2TP offers five. In addition to CHAP and EAP, L2TP offers PAP, SPAP, and MS-CHAP.<\/p>\n\n\n\n<p>L2TP works over standard IP networks, but also X.25 and ATM.<br>Layer 2 Tunneling Protocol (L2TP)<\/p>\n\n\n\n<p>A variation on frequency analysis that is used to attack polyaplhabetic substitution ciphers.<br>Kasiski test<\/p>\n\n\n\n<p>CrypTool<br>Software which allows encryption of text using historic algorithms<\/p>\n\n\n\n<p>The Enigma Machine<br>In World War II the Germans made use of an electro-mechanical rotor based cipher Known as The Enigma Machine.<\/p>\n\n\n\n<p>Allied cipher machines used in WWII included the British TypeX and the American SIGABA.<\/p>\n\n\n\n<p>The ADFGVX Cipher<br>invented by Colonel Fritz Nebel in 1918.<br>The key for this algorithm is a six-by-six square of letters, used to encode a 36-letter alphabet.<\/p>\n\n\n\n<p>The Playfair Cipher<br>invented in 1854 by Charles Wheatstone.<\/p>\n\n\n\n<p>The Playfair cipher uses a five-by-five table containing a keyword or key phrase.<\/p>\n\n\n\n<p>Breaking the Vigene\u0300re Cipher<br>In 1863, Friedrich Kasiski was the first person to publish a successful general attack on the Vigene\u0300re Cipher<\/p>\n\n\n\n<p>The Vigene\u0300re Cipher<br>This is perhaps the most widely known multi-alphabet substitution cipher. invented in 1553 by Giovan Battista Bellaso. Uses a series of different Caesar ciphers based on the letters of a keyword.<\/p>\n\n\n\n<p>The Cipher Disk<br>The cipher disk was invented by Leon Alberti in 1466. each time you turned the disk, you used a new cipher. It was literally a disk you turned to encrypt plaintext.<\/p>\n\n\n\n<p>Multi-Alphabet Substitution<br>Use of multiple substitution alphabets.<br>Example:Cipher Disk, Vigenere Cipher, Enigma Machine<\/p>\n\n\n\n<p>Scytale<br>This was a cylinder tool used by the Greeks, and is often specifically attributed to the Spartans. Physical cylinder that was used to encrypt messages.<\/p>\n\n\n\n<p>ROT13 Cipher<br>It is essentially the Caesar cipher always using a rotation or shift of 13 characters.<\/p>\n\n\n\n<p>The ATBASH Cipher<br>Hebrew scribes copying religious texts used this cipher.<br>substitutes the first letter of the alphabet for the<br>last, and the second letter for the second-to-the-last, etc.<\/p>\n\n\n\n<p>The Caesar Cipher<br>You can choose to shift any number of letters, either left or right. If you choose to shift two to<br>the right, that would be a +2; if you choose to shift four to the left, that would be a -4.<\/p>\n\n\n\n<p>Mono-Alphabet Substitution<br>These algorithms<br>simply substitute one character of cipher text for each character of plain text.<\/p>\n\n\n\n<p>Examples: Atbash Cipher, Caesar Cipher, Rot13<\/p>\n\n\n\n<p>Symmetric Cryptography<br>It is simply any algorithm where the key used to decrypt a message is the same key used to encrypt.<\/p>\n\n\n\n<p>Diffusion<br>Changes to one character in the plain text affect multiple characters in the cipher text.<\/p>\n\n\n\n<p>Confusion<br>Confusion attempts to make the relationship between the statistical frequencies of the cipher text and the actual key as complex as possible. This occurs by using a complex substitution algorithm.<\/p>\n\n\n\n<p>Avalanche<br>a small change yields large effects in the output, This is Fiestel&#8217;s variation on Claude Shannon&#8217;s concept of diffusion.<\/p>\n\n\n\n<p>Kerckhoffs&#8217;s Principle<br>This principle states that a cryptosystem should be secure even if everything about the system, except the key, is publicly known.<\/p>\n\n\n\n<p>Substitution<br>Substitution is changing some part of the plaintext for some matching part of the Cipher Text.<\/p>\n\n\n\n<p>Transposition<br>Transposition is the swapping of blocks of ciphertext.<\/p>\n\n\n\n<p>binary numbers<br>there are three operations not found in normal math:<br>AND, OR, and XOR operations.<\/p>\n\n\n\n<p>Binary AND<br>If both numbers have a one in both places, then the resultant number is a one.<\/p>\n\n\n\n<p>1101<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1001<\/h2>\n\n\n\n<p>1001<\/p>\n\n\n\n<p>Binary OR<br>The OR operation checks to see whether there is a one in either or both numbers in a given place. If so the resulting number is an one.<\/p>\n\n\n\n<p>1101<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1001<\/h2>\n\n\n\n<p>1101<\/p>\n\n\n\n<p>Binary XOR<br>It checks to see whether there is a one in a number in a given place, but not in both numbers at that place. If it is in one number but not the other, then the resultant number is one. If not, the resultant number is zero, as you see here:<\/p>\n\n\n\n<p>1101<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1001<\/h2>\n\n\n\n<p>0100<\/p>\n\n\n\n<p>Block Ciphers<br>A block cipher divides the data into blocks (often 64-bit blocks, but newer algorithms sometimes use 128-bit blocks) and encrypts the data one block at a time.<\/p>\n\n\n\n<p>Stream Ciphers<br>Stream Ciphers encrypt the data as a stream of bits, one bit at a time.<\/p>\n\n\n\n<p>Symmetric Block Cipher Algorithms<br>The Feistel Network 3DES<br>AES Blowfish<br>Serpent Twofish<br>Skipjack IDEA<\/p>\n\n\n\n<p>Feistel Function<br>Larger block sizes increase security.<br>Larger Key sizes increase security.<br>If the round function is secure, then more rounds increase security.<\/p>\n\n\n\n<p>Created by Horst Feistel<\/p>\n\n\n\n<p>Any block cipher that is based on Feistel will essentially work in the same manner; the differences will be what is done in the round function.<\/p>\n\n\n\n<p>Cipher<br>The algorithm(s) needed to encrypt and decrypt a message.<\/p>\n\n\n\n<p>Key<br>The random bits used in encrypting a message.<\/p>\n\n\n\n<p>Algorithm<br>The mathematical process used to alter a message and read it unintelligible by any but the intended party.<\/p>\n\n\n\n<p>Key schedule<br>the generation of sub keys from a single key.<\/p>\n\n\n\n<p>in each round a slightly different key is used, but that key is derived from the original key.<\/p>\n\n\n\n<p>Round Function<br>a function performed with each iteration, or round, of the Feistel cipher<\/p>\n\n\n\n<p>The Feistel Function Process<br>This function starts by splitting the block of plaintext data (often 64 bits) into two parts (traditionally termed L0 and R0).<\/p>\n\n\n\n<p>The round function F is applied to one of the halves<\/p>\n\n\n\n<p>The output of each round function F is then XORed with the other half.<\/p>\n\n\n\n<p>Then the halves are transposed. So L0 gets moved to the right and R0 gets moved to the left.<\/p>\n\n\n\n<p>This process is repeated a given number of times. The main difference between cryptography<br>algorithms is the exact nature of the round function F, and the number of iterations.<\/p>\n\n\n\n<p>Unbalanced Feistel Cipher<br>Unbalanced Feistel ciphers use a modified structure where L0 and R0 are not of equal lengths.<\/p>\n\n\n\n<p>Data Encryption Standard (DES)<br>Developed by IBM in the 70&#8217;s<br>Based off Lucifer cipher<br>No longer secure<\/p>\n\n\n\n<p>Data is divided into 64-bit blocks.<\/p>\n\n\n\n<p>That data is then manipulated by 16 separate steps of encryption involving substitutions, bit-shifting, and logical operations using a 56-bit key.<\/p>\n\n\n\n<p>Data is then further scrambled using a swapping algorithm.<\/p>\n\n\n\n<p>Data is finally transposed one last time.<\/p>\n\n\n\n<p>3DES<br>DES uses a &#8220;key bundle&#8221; which comprises three DES keys, K1, K2, and K3. Each key is standard<br>56-bit DES key. It will then apply the following process:<br>DES encrypt with K1, DES decrypt with K2, then DES encrypt with K3<\/p>\n\n\n\n<p>DESx<br>This is a variation of DES that simply XORs another 64-bit key to the plaintext before applying the DES algorithm.<\/p>\n\n\n\n<p>whitening<br>The concept of simply XORing in an additional key<\/p>\n\n\n\n<p>AES<br>AES is also known as Rijndael block cipher.<\/p>\n\n\n\n<p>It was officially designated as a replacement for DES in 2001 after a 5 year process involving 15 competing algorithms.<\/p>\n\n\n\n<p>AES can have three different key sizes. They are:128, 192, or 256 bits.<\/p>\n\n\n\n<p>AES uses a substitution-permutation matrix rather than a Feistel network. AES operates on a four-by-four column major order matrix of bytes, called the state. (Versions of AES with a larger block size have additional columns in the state.)<\/p>\n\n\n\n<p>AES Process<br>1: Key expansion\u2014Round keys are derived from the cipher key using Rijndael&#8217;s key schedule.<\/p>\n\n\n\n<p>2: Initial round: AddRoundKey\u2014Each byte of the state is combined with the round key using bitwise XOR.<\/p>\n\n\n\n<p>3: Rounds<br>1: SubBytes\u2014A non-linear substitution step where each byte is replaced with another according to a lookup table.<br>2: ShiftRows\u2014A transposition step where each row of the state is shifted cyclically a certian number of steps<br>3: MixColumns\u2014A mix2i7ng operation which operates on the columns of the state, combining the 4 bytes in each column.<br>4: AddRoundKey<\/p>\n\n\n\n<p>4: Final Round<br>1: SubBytes<br>2:ShiftRows<br>3:AddRoundKey<\/p>\n\n\n\n<p>AES SubBytes step<br>In the SubBytes step, each byte in the matrix is substituted for another byte using an 8-bit substitution box, called the Rijndael S-box.<\/p>\n\n\n\n<p>AES ShiftRows step<br>The ShiftRows Step involves shifting the bytes in each row by a certain amount.<\/p>\n\n\n\n<p>AES MixColumns step<br>the four bytes of each column of the state are combined using an invertible linear transformation.<\/p>\n\n\n\n<p>AES AddRoundKey step<br>the subkey is XORed with the state.<\/p>\n\n\n\n<p>AES can use three different key sizes, What are they?<br>It can use a 128-bit, 192-bit, or 256-bit key.<\/p>\n\n\n\n<p>Blowfish<br>designed in 1993 by Bruce Schneier.<\/p>\n\n\n\n<p>Like DES, it is a 16-round Feistel cipher working on 64-bit blocks.<\/p>\n\n\n\n<p>However, unlike DES, it can have varying key sizes ranging from 32 bits to 448 bits.<\/p>\n\n\n\n<p>Which cipher can have varying key sizes ranging from 32 bits to 448 bits.<br>Blowfish<\/p>\n\n\n\n<p>Blowfish is used in a number of products, examples include:<br>BCrypt<br>CryptoDisk<br>DriveCRypt<br>Password Safe<br>Password Wallet<br>Backup for Workgroups<br>Crashplan<\/p>\n\n\n\n<p>Serpent<br>designed by Ross Anderson, Eli Biham, and Lars Knudsen.<\/p>\n\n\n\n<p>Serpent has a block size of 128 bits and can have a key size of 128, 192, or 256 bits,<\/p>\n\n\n\n<p>It uses 32 rounds working with a block of four 32-bit words. Each round applies one of eight 4-bit to 4-bit S-boxes 32 times in parallel. Serpent was designed so that all operations can be executed in<br>parallel.<\/p>\n\n\n\n<p>What were the 5 finalists to replace DES?<br>Twofish, Serpent, Blowfish, AES(Rijndael block cipher),<\/p>\n\n\n\n<p>Twofish<br>This algorithm was one of the five finalists to replace DES for the U.S. government<\/p>\n\n\n\n<p>It uses a block size of 128 bits and key sizes up to 256 bits.<\/p>\n\n\n\n<p>It is a Feistel cipher.<br>It was designed by Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, and Niels Ferguson.<\/p>\n\n\n\n<p>Skipjack<br>Developed by the NSA, and was designed for the clipper chip, a chip with built-in encryption however the decryption key was to be kept in a key escrow in case law enforcement need to decrypt data without the computer owner&#8217;s cooperation. This feature made the process highly controversial<\/p>\n\n\n\n<p>uses an 80-bit key encrypt or decrypt 64-bit data blocks. It is an unbalanced Feistel<\/p>\n\n\n\n<p>Which cipher uses an 80-bit key encrypt or decrypt 64-bit data blocks<br>Skipjack<\/p>\n\n\n\n<p>IDEA<br>The International Data Encryption Algorithm (IDEA) is a block cipher. The algorithm was published in 1991 and was designed by James Massey and Xuejia Lai.<\/p>\n\n\n\n<p>IDEA operates on 64-bit blocks and has a 128-bit key. The algorithm consists of a series of eight identical transformations (each round) and an output transformation. It was designed as a replacement for DES.<\/p>\n\n\n\n<p>Electronic Codebook (ECB)<br>The most basic encryption mode is the electronic codebook (ECB) mode.<\/p>\n\n\n\n<p>Messages are divided into blocks and each block is encrypted separately.<\/p>\n\n\n\n<p>If you submit the same plaintext more than once, you always get the same ciphertext giving the attacker an advantage.<\/p>\n\n\n\n<p>Cipher-Block Chaining (CBC)<br>each block of plaintext is XORed with the<br>previous ciphertext block before being encrypted.<\/p>\n\n\n\n<p>Propagating Cipher-Block Chaining (PCBC)<br>The propagating cipher-block chaining mode was designed to cause small changes in the ciphertext to propagate indefinitely when decrypting, as well as when encrypting. This method is sometimes called plaintext cipher-block chaining. The PCBC mode is a variation on the CBC mode of operation. It is important to keep in mind that the PCBC mode of encryption has not been formally published as a federal standard.<\/p>\n\n\n\n<p>Cipher Feedback (CFB)<br>the previous ciphertext block is encrypted then the ciphertext produced is XORed back with the plaintext to produce the current ciphertext block. Essentially it loops back on itself, increasing the randomness of the resultant ciphertext.<\/p>\n\n\n\n<p>Output Feedback (OFB)<br>The output feedback (OFB) mode turns a block cipher into a synchronous stream<br>cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.<\/p>\n\n\n\n<p>Counter (CTR)<br>Counter mode (CTR) is also used to turn a block cipher into a stream cipher. This is much like OFB mode. CTR generates the next keystream block by encrypting successive values of a &#8220;counter.&#8221; The counter can be any simple function that produces a sequence that is guaranteed not to repeat for a long time.<\/p>\n\n\n\n<p>An initialization vector<br>a fixed-size input to a cryptographic primitive that is random or pseudo-random.<\/p>\n\n\n\n<p>Symmetric Stream Ciphers<br>Stream ciphers are also sometimes called state ciphers. In a synchronous stream cipher, a stream of pseudo-random digits is generated independently. That stream of digits (the key also called the key stream) is then combined with the plaintext (to encrypt) or the ciphertext (to decrypt).<\/p>\n\n\n\n<p>RC4<br>Symmetric Stream Cipher<\/p>\n\n\n\n<p>Ron Rivest created this algorithm in 1987. The RC stands for Ron&#8217;s Cipher.<\/p>\n\n\n\n<p>RC4 uses a variable length key from 1 to 256 bytes. That key constitutes a state table that is<br>used for subsequent generation of pseudo-random bytes and then to generate a pseudo-<br>stream which is XORed with the plaintext to produce the ciphertext. RC4 generates a<br>pseudo-random stream of bits.<\/p>\n\n\n\n<p>FISH<br>This algorithm was published by the German engineering firm Seimans in 1993.<\/p>\n\n\n\n<p>(FIbonacci SHrinking) cipher is a software-based stream cipher using Lagged Fibonacci generator along with a concept borrowed from the shrinking generator ciphers.<\/p>\n\n\n\n<p>PIKE<br>Published in a paper by Ross Anderson as an improvement on FISH.<\/p>\n\n\n\n<p>Hash<br>A hash function H is a function that takes a variable-size input m and returns a fixed-<br>size string.<\/p>\n\n\n\n<p>h = H(m)<\/p>\n\n\n\n<p>H(x) is one-way, you cannot &#8220;un hash something.&#8221;<\/p>\n\n\n\n<p>H(x) is collision-free. Two different input values do not produce the same output.<\/p>\n\n\n\n<p>Hash Salt<br>random bits that are used as one<br>of the inputs to the hash.<\/p>\n\n\n\n<p>MD5<br>128-bit hash that is specified by RFC 1321.<\/p>\n\n\n\n<p>The biggest problem with MD5 is that it is not collision resistant<\/p>\n\n\n\n<p>message is broken into 512-byte chunks (16-32 bit integers). the message is padded with zeros if needed to reach 512-byte chunks.<\/p>\n\n\n\n<p>The algorithm operates on a 128-bit state, divided into four 32-bit words, denoted A, B, C, and D. They are initialized to an initial variable.<\/p>\n\n\n\n<p>The algorithm consists of four stages or rounds, each of which consists of 16 similar operations.<\/p>\n\n\n\n<p>MD6<br>MD6 uses a Merkle tree-like structure to allow for immense parallel computation of<br>hashes for very long inputs.<\/p>\n\n\n\n<p>SHA-1:<br>This is a 160-bit hash which resembles the earlier MD5 algorithm<\/p>\n\n\n\n<p>designed by the NSA to be part of the digital signature algorithm<\/p>\n\n\n\n<p>SHA-2:<br>two similar hash functions, with different block sizes, known as SHA-256 and SHA-512. They differ in the word size; SHA-256 uses 32-byte (256 bit) words where SHA-512 user 4-byte (512 bit)words.<\/p>\n\n\n\n<p>SHA-3:<br>proposed hash function still in development<\/p>\n\n\n\n<p>FORK-256<br>This hash function uses 512-bit blocks and implements preset constants that change after each repetition.<\/p>\n\n\n\n<p>Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words<\/p>\n\n\n\n<p>RIPEMD-160<br>RACE Integrity Primitives Evaluation Message Digest (RIPEMD-160) is a 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel.<\/p>\n\n\n\n<p>There exist 128-, 256-, and 320-bit versions of this algorithm<\/p>\n\n\n\n<p>The larger bit sizes make this far more secure that MD5 or RIPEMD.<\/p>\n\n\n\n<p>GOST<br>This hash algorithm was initially defined in the Russian national standard GOST R 34.11-94 &#8220;Information Technology &#8211; Cryptographic Information Security &#8211; Hash Function.&#8221;<\/p>\n\n\n\n<p>This hash algorithm produces a fixed-length output of 256 bits. The input message is broken up<br>into chunks of 256-bit blocks. If a block is less than 256 bits, then the message is padded by appending as many zeros to it<\/p>\n\n\n\n<p>Tiger<br>This hash function was designed by Ross Anderson and Eli Biham in 1995. The size of a Tiger hash value is 192 bits.<\/p>\n\n\n\n<p>Hash Algorithms<br>Tiger<br>GOST<br>FORK-256<br>RIPEMD-160<br>SHA<br>MD5<br>MD6<\/p>\n\n\n\n<p>CryptoBench<br>used to see the output of a number of hashes.<\/p>\n\n\n\n<p>More AES<br>Advanced Encryption Standard, also Known as Rijndael block cipher, was ultimately chosen as a replacement for DES in 2001 after a 5 year process involving 15 competing algorithms<\/p>\n\n\n\n<p>blowfish<br>Blowfish is unpatented, and will remain so in all countries. The algorithm is hereby placed in the public domain, and can be freely used by anyone<\/p>\n\n\n\n<p>Asymmetric Cryptography<br>also called public key cryptography,<\/p>\n\n\n\n<p>developed to overcome key exchange weakness in symmetric cryptography.<\/p>\n\n\n\n<p>one key is used to encrypt a message (called the public key) and another is used to decrypt the message (called the private key).<\/p>\n\n\n\n<p>You can freely distribute your public key so that anyone can encrypt a message to send to you, but you are the only one who has theprivate key and only you can decrypt the message.<\/p>\n\n\n\n<p>all public key algorithms are dependent upon number theory.<\/p>\n\n\n\n<p>public key\/asymmetric flow<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Bob needs to get Alice&#8217;s public key. Now that should be easy. Alice can publish it, or even put it on the web if she wants.<\/li>\n\n\n\n<li>So Bob encrypts the message with Alice&#8217;s public key and sends it to her.<\/li>\n\n\n\n<li>When Alice receives the message, she can decrypt it with her private key.<\/li>\n\n\n\n<li>Should someone else intercept the message and also have Alice&#8217;s public key, they won&#8217;t be able to decrypt it. Only Alice&#8217;s private key can do that.<\/li>\n<\/ol>\n\n\n\n<p>entropy<br>In information theory, entropy is a measure of the uncertainty associated with a random variable.<\/p>\n\n\n\n<p>Shannon&#8217;s source coding theorem<br>states: it is impossible to compress the data such that the code rate is less than the Shannon entropy of the source, without it being virtually certain that information will be lost.<\/p>\n\n\n\n<p>Basic Number Theory<br>N denotes natural numbers. These are also sometimes called the counting numbers. They are 1, 2, 3, etc.<\/p>\n\n\n\n<p>Z denotes the integers. These are whole numbers such as -1, 0, 1, 2, etc. Basically, this set is the natural numbers combined with zero and the negative numbers.<\/p>\n\n\n\n<p>Q denotes rational numbers (or the ratios of integers). They are any number that can be expressed as a ratio of two integers. Examples are 3\/2, 17\/4, and 1\/5.<\/p>\n\n\n\n<p>R denotes real numbers. This includes the rational number as well as numbers that cannot be expressed as a ratio of two integers, such as 2\/3.<\/p>\n\n\n\n<p>i denotes imaginary numbers. These are numbers whose square is a negative. For example, \u221a-1 = 1i.<\/p>\n\n\n\n<p>Fibonacci Numbers<br>Sequence of numbers derived by adding the last to numbers to create the next.<\/p>\n\n\n\n<p>1, 1, 2, 3, 5, 8,<\/p>\n\n\n\n<p>Birthday Attack<br>A birthday attack is a name used to refer to a class of brute force attacks based on the birthday paradox.<\/p>\n\n\n\n<p>Random Number Generators<br>A true totally random number is not possible to generate from a computer algorithm.<\/p>\n\n\n\n<p>There are three types of generator<br>Table look-up generators<br>Hardware generators<br>Algorithmic (software) generators<\/p>\n\n\n\n<p>Classification of Random Number Generators<br>K1: A sequence of random numbers with a low probability of containing identical consecutive elements.<\/p>\n\n\n\n<p>K2: A sequence of numbers which is indistinguishable from &#8220;true random&#8221; numbers according to specified statistical tests.<\/p>\n\n\n\n<p>K3: It should be impossible for any attacker to calculate, or otherwise guess, from any given, previous, or future values in the sequence<\/p>\n\n\n\n<p>K4: It should be impossible for an attacker to calculate, or guess from an inner state of<br>the generator, any previous numbers in the sequence or any previous inner generator<\/p>\n\n\n\n<p>To be suitable for cryptography, any PRNG should meet K3 and K4 standards.<\/p>\n\n\n\n<p>Linear Congruential Generator<br>Xn +1=(aXn +c)modm<\/p>\n\n\n\n<p>Lehmer Random Number Generator<br>Xi+1 =(aXi +c)modm,with0\u2264Xi \u2264m<\/p>\n\n\n\n<p>Lagged Fibonacci Generator (LFG)<br>y = xk + xj + 1<\/p>\n\n\n\n<p>Diffie-Hellman<br>first publicly described asymmetric algorithm.<\/p>\n\n\n\n<p>allow parties to exchange a symmetric key over unsecure medium, such as the internet<\/p>\n\n\n\n<p>RSA<br>most widely used asymmetric encryption algorithm.<\/p>\n\n\n\n<p>1977 by three mathematicians, Ron Rivest, Adi Shamir, and Len Adleman.<\/p>\n\n\n\n<p>RSA is based on large prime numbers.<\/p>\n\n\n\n<p>RSA can use 1024, 2048, 4096 bit and larger keys.<\/p>\n\n\n\n<p>Menezes-Qu-Vanstone<br>based on on Diffie-Hellman. It was first proposed by Menezes, Qu, and Vanstone in 1995 and was thenmodified in 1998. It is incorporated in the public key standard IEEE P1363. HQMV is an<br>improved version.<\/p>\n\n\n\n<p>DSA<br>U.S. Patent 5,231,668, filed July 26, 1991, and attributed to David W. Kravitz. It was adopted by the U.S. government in 1993 with FIPS 186.<\/p>\n\n\n\n<p>Elliptic Curve<br>1985 by Victor Miller (IBM) and Neil Koblitz<\/p>\n\n\n\n<p>The security of Elliptic Curve cryptography is based on the fact that finding the discrete logarithm of a random elliptic curve element with respect to a publicly known base point is difficult to the point of being impracticable.<\/p>\n\n\n\n<p>y2 = x3 + Ax + B<\/p>\n\n\n\n<p>Elliptic Curve Variations<br>Elliptic Curve Diffie Hellman (used for key exchange)<br>Elliptic Curve Digital Signature Algorithm (ECDSA)<br>Elliptic Curve MQV key agreement protocol<\/p>\n\n\n\n<p>El gamal<br>This algorithm is based on Diffie-Hellman and was invented in 1984 by Taher Elgamal.<\/p>\n\n\n\n<p>to many possible It is used in some PGP implementations as well as GNU Privacy Guard software.<\/p>\n\n\n\n<p>three parts: the key generator, the encryption algorithm, and the decryption algorithm<\/p>\n\n\n\n<p>Elgamal encryption is probabilistic<\/p>\n\n\n\n<p>probabilistic<br>any given plaintext can be encrypted to many possible ciphertexts.<\/p>\n\n\n\n<p>asymmetric encryption algoriths<br>RSA, DSA, Diffie-Hellman, Elliptic Curve, El gamal<\/p>\n\n\n\n<p>Digital Signatures<br>not used to ensure the confidentiality of a message, but rather to guarantee who sent the message.<\/p>\n\n\n\n<p>the sender encrypts something with his or her private key, and is decrypted with their public key.<\/p>\n\n\n\n<p>Digital Certificate<br>A digital certificate contains a public key and some means to verify whose public key it is.<\/p>\n\n\n\n<p>representation of information that identifies you as a relevant entity by a trusted third party<\/p>\n\n\n\n<p>Certification Authority<br>entity trusted by one or more users to manage certificates.<\/p>\n\n\n\n<p>trusted third party<\/p>\n\n\n\n<p>primary role of the CA is to digitally sign and<br>publish the public key bound to a given user.<\/p>\n\n\n\n<p>Registration Authority<br>used to take the burden off of a CA by handling verification prior to certificates being issued. RA acts as a proxy between user and CA. RA<br>RA (Registration Authority) is used to take the burden off of a CA by handling verification prior to certificates being issued.<\/p>\n\n\n\n<p>certificate Policy<br>rules that define how a certificate may be used.<\/p>\n\n\n\n<p>PKCS (Public Key Cryptography Standards)<br>in place by RSA to ensure uniform certificate management throughout the internet.<\/p>\n\n\n\n<p>X.509<br>international standard for the format and information contained in a digital cert.<\/p>\n\n\n\n<p>The most common type of digital certificate in the world.<\/p>\n\n\n\n<p>Relied on by S\/MIME<\/p>\n\n\n\n<p>CRL<br>CRL (Certificate Revocation List) &#8211; list of certificates issued by a CA that are no longer valid<\/p>\n\n\n\n<p>PUSH Model: CA automatically sends the CRL out a regular intervals<\/p>\n\n\n\n<p>Pull Model: The CRL is downloaded from the CA by those who want to see it to verify a certificate. End user is responsible<\/p>\n\n\n\n<p>X.509 Certificate Content<br>Version<br>Certificate holder&#8217;s public key<br>Serial number<br>Certificate holder&#8217;s distinguished name<br>Cert&#8217;s validity period<br>Unique name of certificate issuer<br>Digital signature of issuer<br>Signature algorithm identifier<\/p>\n\n\n\n<p>X.509 Certificate File Extensions<br>.pem &#8211; Base64 encoded DER certificate, enclosed between &#8220;&#8212;&#8211;BEGIN CERTIFICATE&#8212;&#8211;&#8221; and &#8220;&#8212;&#8211;END CERTIFICATE&#8212;&#8211;&#8220;<\/p>\n\n\n\n<p>.cer, .crt., .der. &#8211; Usually in binary DER form,<\/p>\n\n\n\n<p>.p7b, .p7c: PKCS#7 SignedData structure without data, just certificate(s) or CRL(s)<\/p>\n\n\n\n<p>.p12: PKCS#12, may contain certificate(s) (public) and private keys (password protected)<\/p>\n\n\n\n<p>.pfx: PFX, predecessor of PKCS#12 (usually contains data in PKCS#12 format, e.g., with<br>PFX files generated in IIS)<\/p>\n\n\n\n<p>Certificate Authority &#8211; Verisign<br>Class 1 -for individuals, intended for email<br>Class 2 &#8211; for organizations for which proof of identity is required<br>Class 3 &#8211; for servers and software signing, for which independent verification and checking of identity and authority is done by the issuing CA<br>Class 4 -for online business transactions between companies<br>Class 5 &#8211; for private organizations or governmental security<\/p>\n\n\n\n<p>Public Key Infrastructure (PKI)<br>A PKI is an arrangement that binds public keys with respective user identities by means of a CA.<\/p>\n\n\n\n<p>Online Certificate Status Protocol (OSCP)<br>real-time protocol for verifying certificates.<\/p>\n\n\n\n<p>Password Authentication Protocol (PAP)<br>name and password are transmitted over a network and compared to a table of name-password pairs. transmissions of the passwords are in cleartext, unencrypted.<\/p>\n\n\n\n<p>Shiva Password Authentication Protocol (SPAP)<br>PAP that does encrypt the username and password that is sent over the Internet.<\/p>\n\n\n\n<p>Challenge-Handshake Authentication Protocol<br>(CHAP)<br>calculates a hash after the user has logged in, then it shares that hash with the client system. Periodically, the server will ask the Client to provide the hash.<\/p>\n\n\n\n<p>Pretty Good Privacy (PGP)<br>Pretty Good Privacy (PGP) was invented by Phillip Zimmerman in the early 1990s. PGP<br>is not an algorithm in itself. It uses other, well-established asymmetric and symmetric algorithms.<\/p>\n\n\n\n<p>most often associated with email encryption.<\/p>\n\n\n\n<p>PGP can also be used to create certificates. they are self-generated, there is no way to validate them with a certificate authority.<\/p>\n\n\n\n<p>Kerberos<br>used widely, particularly with Microsoft operating systems<\/p>\n\n\n\n<p>A user logs in, the authentication server verifies their identity and then contacts the ticket granting server (these are often on the same machine). The ticket granting server sends an encrypted &#8220;ticket&#8221; to the user&#8217;s machine. That ticket identifies the user as being logged in.<\/p>\n\n\n\n<p>When the user needs to access some resource on the network, the user&#8217;s machine uses that ticket granting ticket to get access to the target machine.<\/p>\n\n\n\n<p>Wired Equivalent Privacy (WEP)<br>A combination of tunneling, encryption, authentication, and access control technologies and services used to carry traffic over the Internet, a managed IP network or a provider&#8217;s backbone.<\/p>\n\n\n\n<p>Wifi Encryption<br>WEP (Wired Equivalent Privacy ) &#8211; uses the stream cipher RC4 . 128 bit or 256 bit<\/p>\n\n\n\n<p>WPA Wi-Fi Protected Access: Pre-shared key mode (PSK, also known as Personal mode) is designed for home and small business that do not require authentication servers<\/p>\n\n\n\n<p>WPA 2 &#8211; Implements the mandatory elements of 802.11i, introduces CCMP, AES- based encryption. CCMP is Counter Mode with Cipher Block Chaining Message Authentication Code Protocol<\/p>\n\n\n\n<p>VPN<\/p>\n\n\n\n<p>CHAP<br>three-way process whereby the client sends a code to the server, the server authenticates it, and then the server responds to the client. CHAP also periodically re-authenticates a remote client<\/p>\n\n\n\n<p>VPN Protocols<br>Point to Point Tunneling Protocol (PPTP)<br>Layer 2 Tunneling Protocol (L2TP)<br>Internet Protocol Security (IPSec)<br>SSL\/TLS VPN<\/p>\n\n\n\n<p>Point to Point Tunneling Protocol (PPTP)<br>is the oldest of the three protocols used in<br>VPNs.<\/p>\n\n\n\n<p>adds the features of encrypting packets and authenticating users to the older PPP protocol.<\/p>\n\n\n\n<p>PPTP offers two different methods of authenticating the user: Extensible Authentication Protocol (EAP) and Challenge Handshake Authentication Protocol (CHAP).<\/p>\n\n\n\n<p>PPTP uses Microsoft Point-to-Point Encryption (MPPE) to encrypt packets.<\/p>\n\n\n\n<p>Layer 2 Tunneling Protocol (L2TP)<br>was explicitly designed as an enhancement to PPTP.<\/p>\n\n\n\n<p>Like PPTP, it works at the data link layer of the OSI model.<\/p>\n\n\n\n<p>it offers more and varied methods for authentication; PPTP offers two, whereas L2TP offers five. In addition to CHAP and EAP, L2TP offers PAP, SPAP, and MS-CHAP.<\/p>\n\n\n\n<p>also woks over x.25 networks (Phone) and asynchronous transfer mode, ATM.<\/p>\n\n\n\n<p>Internet Protocol Security VPN (IPSec)<br>one of the differences between IPSec and the other two methods is that it encrypts not only the packet data but also the header information.<\/p>\n\n\n\n<p>also has protection against unauthorized retransmission of packets<\/p>\n\n\n\n<p>Encrypting File system (EFS)<br>Since Windows 2000, Microsoft has implemented the Encrypting File system (EFS)<\/p>\n\n\n\n<p>SSL\/TLS VPN<br>With SSL\/TLS VPNs, the VPN is set up through a web browser. That portal uses SSL\/TLS to secure the web traffic. However, instead<br>of simply giving the user limited access to secure data, such as a bank account, the web portal<br>gives the user access to the target network.<\/p>\n\n\n\n<p>:Truecrypt<br>open source product called TrueCrypt (www.Truecrypt.org) that is free,<\/p>\n\n\n\n<p>Steganography<br>art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message.<\/p>\n\n\n\n<p>often the message is hidden in some other file such as a digital picture or audio file, so as to defy detection. Often the message is hidden in a d<\/p>\n\n\n\n<p>Steganography Terms<br>Payload is the data to be covertly communicated.<\/p>\n\n\n\n<p>The carrier is the signal, stream, or data file into which the payload is hidden<\/p>\n\n\n\n<p>The Channel is the type of medium used. This may be still photos, videos, or sound files<\/p>\n\n\n\n<p>Least Significant Bit (LSB)<br>certain bits in the carrier file are replaced<\/p>\n\n\n\n<p>Echo Hiding.<br>adds extra sound to an echo inside an audio file, that extra sound conceals information.<\/p>\n\n\n\n<p>National Security Agency:Type 2 Algorithms<br>Type 2 products are unclassified cryptographic equipment, assemblies, or components, endorsed by the NSA<\/p>\n\n\n\n<p>Skipjack (a block cipher)<br>KEA<\/p>\n\n\n\n<p>National Security Agency and Cryptography<br>They classify cryptography as first Suite A or Suite B. Suite A cryptographies are not published. Suite B are published. In other words, even the algorithms used in Suite A are classified. Then the NSA also classifies algorithms as Type 1, 2, 3, or 4, with 1 being the highest.<\/p>\n\n\n\n<p>National Security Agency:Type 1 Algorithms<br>JUNIPER &#8211; Block cipher<br>MAYFLY &#8211; Asymmetric<br>JUNIPER &#8211; Block Cipher<br>FASTHASH &#8211; Hashing<br>WALBURN &#8211; High Bandwidth link encryption<br>PEGASUS &#8211; Satellite telemetry<\/p>\n\n\n\n<p>National Security Agency: Type 3 Algorithms<br>Type 3 products are devices for use with Sensitive, But Unclassified (SBU) information<\/p>\n\n\n\n<p>DES<br>3DES<br>SHA<br>AES<\/p>\n\n\n\n<p>National Security Agency: Type 4 Algorithms<br>A Type 4 algorithm refers to algorithms that are registered by the National Institute of Standards and Technology (NIST) but are not Federal Information Processing Standards (FIPS)<\/p>\n\n\n\n<p>Frequency Analysis<br>This is the most basic tool for breaking most classical ciphers. In natural languages, certain letters of the alphabet appear more frequently than others. By examining those frequencies, you can derive some information about the key that was used.<\/p>\n\n\n\n<p>One Time Pad (OTP).<br>TO date only one encryption is unbreakable. That is the One Time Pad (OTP). OTP is a separate substitution for each character.<\/p>\n\n\n\n<p>No substitution is used more than once. The key is only used one time, is kept secret, and is destroyed after use.<\/p>\n\n\n\n<p>Kasiski<br>It is a method of attacking polyalphabetic substitution ciphers, such as the Vigene\u0300re cipher. This method can be<br>used to deduce the length of the keyword used in the polyalphabetic substitution cipher.<\/p>\n\n\n\n<p>Ciphertext-only<br>The attacker only has access to a collection of cipher texts. This is much more likely than known plaintext, but also the most difficult.<\/p>\n\n\n\n<p>Chosen plaintext attack<br>attacker obtains the ciphertexts corresponding to a set of plaintexts of his own choosing. This can allow the attacker to attempt to derive the key used and thus decrypt other messages<\/p>\n\n\n\n<p>related-key attack<br>similar to the chosen plaintext attack, except the attacker can obtain ciphertexts encrypted under two different keys.<\/p>\n\n\n\n<p>Linear Cryptanalysis<br>Linear cryptanalysis is based on finding affine approximations to the action of a cipher. It is commonly used on block ciphers. This technique was invented by Mitsarue Matsui.<\/p>\n\n\n\n<p>known plaintext attack and uses a linear approximation to describe the behavior of the block<\/p>\n\n\n\n<p>Differential Cryptanalysis<br>Differential cryptanalysis is a form of cryptanalysis applicable to symmetric key<br>algorithms. This was invented by Eli Biham and Adi Shamir. Essentially, it is the examination of<br>differences in an input and how that affects the resultant difference in the output.<\/p>\n\n\n\n<p>Integral Cryptanalysis<br>Integral cryptanalysis was first described by Lars Knudsen. This attack is particularly useful against block ciphers based on substitution-permutation networks as an extension of differential cryptanalysis.<\/p>\n\n\n\n<p>Total break:<br>The attacker deduces the secret key<\/p>\n\n\n\n<p>Cryptanalysis Resources<br>Regardless of the technique used, there are three resources for cryptanalysis:<\/p>\n\n\n\n<p>Time &#8211; The number of &#8220;primitive operations&#8221; which must be performed.<\/p>\n\n\n\n<p>Memory- The amount of storage required to perform the attack<\/p>\n\n\n\n<p>Data- The quantity of plaintexts and ciphertexts required<\/p>\n\n\n\n<p>Global deduction:<br>The attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key<\/p>\n\n\n\n<p>Instance (local) deduction:<br>The attacker discovers additional plaintexts (or ciphertexts) not previously known<\/p>\n\n\n\n<p>Information deduction:<br>The attacker gains some Shannon information about plaintexts (or ciphertexts) not previously known.<\/p>\n\n\n\n<p>Distinguishing Algorithm<br>attacker can distinguish the cipher from a random permutation.<\/p>\n\n\n\n<p>rainbow tables<br>password crackers are working with pre-calculated hashes of all passwords available within a certain character space, be that a-z, or a-zA-z, or a-zA-Z0-9, etc.<\/p>\n\n\n\n<p>Symmetric<br>Which encryption standard uses the same key to encrypt and decrypt messages?<\/p>\n\n\n\n<p>Skipjack<br>Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)?<\/p>\n\n\n\n<p>X.509 v3<br>What is the most commonly used format for certificates?<\/p>\n\n\n\n<p>Certificate revocation list (CRL)<br>What is referenced to determine if a certificate has been revoked?<\/p>\n\n\n\n<p>Sender&#8217;s public key<br>What needs to be installed on end users&#8217; computers to allow them to trust applications that have been digitally signed by the developer?<\/p>\n\n\n\n<p>Public Certificate<br>Which type of certificate must be certified by an authority to verify it with other participants?<\/p>\n\n\n\n<p>It requires a unique nonce.<br>What is an attribute of the Rivest Cipher 4 (RC4) algorithm?<\/p>\n\n\n\n<p>Counter (CTR)<br>Which mode generates the key stream with a nonce and incrementing value?<\/p>\n\n\n\n<p>Counter (CTR)<br>Which mode is a stream algorithm that concatenates an incrementing value with a nonce?<\/p>\n\n\n\n<p>CEO&#8217;s public key<br>Which key would an administrator use to encrypt data so only the CEO can decrypt it?<\/p>\n\n\n\n<p>Digest<br>What is the result of a hash function?<\/p>\n\n\n\n<p>Symmetric encryption<br>What is used to efficiently encrypt large files?<\/p>\n\n\n\n<p>hvxfirgb<br>An administrator needs to encrypt the following word with the Atbash cipher: security What is the correct ciphertext?<\/p>\n\n\n\n<p>Message Digest Algorithm 5 (MD5)<br>Which cryptographic algorithm has a 128-bit hash size?<\/p>\n\n\n\n<p>Collision resistance<br>Which characteristic makes a hashing function suitable for use in signature schemes?<\/p>\n\n\n\n<p>Partial-message collision<br>Which attribute of a hashing function makes a birthday attack possible?<\/p>\n\n\n\n<p>SHA-1<br>Which hash algorithm produces a 160-bit output value?<\/p>\n\n\n\n<p>Previous generated ciphertext<br>What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext?<\/p>\n\n\n\n<p>Electronic codebook (ECB)<br>Which mode produces the same ciphertext from two identical plaintext blocks?<\/p>\n\n\n\n<p>Electronic codebook (ECB)<br>Which encryption mode is least secure?<\/p>\n\n\n\n<p>P = E (K,C)<br>What is the mathematical formula used for symmetric decryption?<\/p>\n\n\n\n<p>Rivest-Shamir-Adleman<br>Which algorithm relies on factoring the product of large prime numbers?<\/p>\n\n\n\n<p>Pretty Good Privacy (PGP)<br>Which encryption technology is a serial combination of hashing, data compression, symmetric-key cryptography, and public key infrastructure (PKI) and can be used for encrypting texts, emails, files, and directories or for full disk encryption?<\/p>\n\n\n\n<p>Kerckhoffs&#8217;s principle<br>Which concept stipulates that algorithms should be openly shared and scrutinized, but keys must be absolutely secured?<\/p>\n\n\n\n<p>Randomizing the initialization vector<br>Which encryption process minimizes known plaintext attacks against Advanced Encryption Standard (AES)?<\/p>\n\n\n\n<p>Salting<br>What prevents a rainbow table attack during the encryption process?<\/p>\n\n\n\n<p>Larger key size<br>Which factor increases the required number of attempts in a brute-force attack?<\/p>\n\n\n\n<p>Key length is too short.<br>What is a vulnerability of the Data Encryption Standard (DES)?<\/p>\n\n\n\n<p>128<br>Which block size does the Advanced Encryption Standard (AES) use?<\/p>\n\n\n\n<p>Skipjack<br>Which block algorithm includes a provision for the decryption key kept in a key escrow?<\/p>\n\n\n\n<p>A|C<br>What is the result of A|B and B|C?<\/p>\n\n\n\n<p>( X mod P, X mod Q)<br>How is X mod N if N = PQ represented in number theory?<\/p>\n\n\n\n<p>10000<br>What is the outcome when using the binary AND function on 11011 and 10100?<\/p>\n\n\n\n<p>Counter (CTR)<br>Which mode does the Fortuna algorithm use to generate random numbers?<\/p>\n\n\n\n<p>Same state used more than once<br>What is a potential weakness of a pseudo-random number generator (PRNG)?<\/p>\n\n\n\n<p>Recipient&#8217;s private key to decrypt and sender&#8217;s public key to verify the signature<br>Which key combination is used to decrypt and verify a digital signature?<\/p>\n\n\n\n<p>Sender&#8217;s private key<br>Which key is used to sign a message or a message digest?<\/p>\n\n\n\n<p>Server&#8217;s private key<br>Which key does the certificate authority (CA) use to digitally sign keys that it issues?<\/p>\n\n\n\n<p>Sender&#8217;s public key<br>What does an end user need to verify a Rivest-Shamir -Adleman (RSA) digitally signed message?<\/p>\n\n\n\n<p>The private key of the person creating the message<br>What is used when creating a digital signature, using public key infrastructure (PKI)?<\/p>\n\n\n\n<p>Cyclic redundancy check<br>Which feature in Wired Equivalent Privacy (WEP) provides integrity control when sending packets over a wireless network?<\/p>\n\n\n\n<p>Temporal Key Integrity Protocol (TKIP)<br>Which feature of Wi-Fi Protected Access (WPA) increases the difficulty of attack?<\/p>\n\n\n\n<p>Confidentiality\/Integrity<br>Which two concerns does the use of Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) address?<\/p>\n\n\n\n<p>.p12<br>Which extension designates a file containing a password-protected private key?<\/p>\n\n\n\n<p>Certificate policy (CP)<br>Which part of the public key infrastructure (PKI) defines how a credential is used?<\/p>\n\n\n\n<p>Public Key Cryptography Standards (PKCS)<br>Which part of the public key infrastructure (PKI) is used to ensure that the format for a credential can be used by anyone on the internet?<\/p>\n\n\n\n<p>Internet Protocol Security (IPsec)<br>Which solution is used in a Layer 2 Tunneling Protocol (L2TP) virtual private network (VPN) to secure data in transmission?<\/p>\n\n\n\n<p>IP security (IPsec)<br>Which network-based virtual private network (VPN) prevents unauthorized logins by preventing packet retransmission?<\/p>\n\n\n\n<p>Port 443<br>Which port does Secure Socket Tunneling Protocol (SSTP) use?<\/p>\n\n\n\n<p>Secure key exchange<br>What is a common problem with using pre-shared keys (PSKs)?<\/p>\n\n\n\n<p>Integrity<br>What is a concern with storing long-term secrets on media or memory?<\/p>\n\n\n\n<p>Vigen\u00e8re<br>Which cipher uses a series of ciphers based on a keyword?<\/p>\n\n\n\n<p>Atbash<br>Which substitution cipher system reverses the sequence of the alphabet?<\/p>\n\n\n\n<p>Affine<br>Which type of cipher converts a letter to a number, passes it through a mathematical function, and then converts it back to a letter?<\/p>\n\n\n\n<p>Kasiski&#8217;s method<br>Which technique solves polyalphabetic substitution ciphers by deducing the key length?<\/p>\n\n\n\n<p>Frequency analysis<br>Which cryptanalysis technique examines ciphertext for recurring letter combinations?<\/p>\n\n\n\n<p>Chosen plaintext attack<br>Which cryptanalysis method involves a person being tricked into encrypting a set of known messages?<\/p>\n\n\n\n<p>Messages are encrypted using different secrets, and the analyst compares the messages to figure out how the algorithm works.<br>Which technique does related-key cryptanalysis use to decipher a message?<\/p>\n\n\n\n<p>Steganography<br>Which type of cryptography is being used when the author uses secret inks?<\/p>\n\n\n\n<p>Payload<br>What is the hidden message in a steganographic communication?<\/p>\n\n\n\n<p>By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.)<br>How did the ATBASH cipher work?<\/p>\n\n\n\n<p>2 to the 56th power<br>DES has a key space of what?<\/p>\n\n\n\n<p>128\/192\/256<br>Which of the following are valid key sizes for AES (choose three)?<\/p>\n\n\n\n<p>3DES<br>Which of the following algorithms uses three different keys to encrypt the plain text?<\/p>\n\n\n\n<p>Block Cipher<br>AES is what type of cipher?<\/p>\n\n\n\n<p>Asymmetric<br>Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?<\/p>\n\n\n\n<p>RSA<br>Which of the following is an asymmetric cipher?<\/p>\n\n\n\n<p>The algorithm(s) needed to encrypt and decrypt a message<br>A cipher is defined as what<\/p>\n\n\n\n<p>Symmetric systems<br>AES is what type of system?<\/p>\n\n\n\n<p>Joan&#8217;s public key<br>John is going to use RSA to encrypt a message to Joan. What key should he use?<\/p>\n\n\n\n<p>They are faster<br>What advantage do symmetric algorithms have over asymmetric algorithms<\/p>\n\n\n\n<p>Larger key sizes increase security<br>Which of the following is generally true about key sizes?<\/p>\n\n\n\n<p>Hash<br>A <strong>_<\/strong> is a function and is not reversible.<\/p>\n\n\n\n<p>Diffie-Hellman (DH)\/Menezes-Qu-Vanstone (MQV)\/Elliptic-curve Diffie-Hellman (ECDH)<br>What are protocols for exchanging keys?<\/p>\n\n\n\n<p>AES<br>Which of the following would be the fastest: RSA\/AES\/DH\/EC<\/p>\n\n\n\n<p>DES<br>Which of the following would be the weakest encryption algorithm? RSA\/AES\/DES\/EC<\/p>\n\n\n\n<p>256<br>What is the largest key size that AES can use?<\/p>\n\n\n\n<p>AES<br>All of the following are key exchange protocols except for____ DH\/AES\/MQV\/ECDH<\/p>\n\n\n\n<p>RSA<br>What encryption algorithm relies on the inability to factor large prime numbers?<\/p>\n\n\n\n<p>Letter\/word frequency is maintained<br>Using substitution without transposition leads to what weakness?<\/p>\n\n\n\n<p>Skipjack<br>What algorithm does the clipper chip use?<\/p>\n\n\n\n<p>80 bit<br>What size key does Skipjack use?<\/p>\n\n\n\n<p>64<br>What size block does Skipjack use?<\/p>\n\n\n\n<p>The message is divided into blocks and each block is encrypted separately. This is the most basic mode for symmetric encryption.<br>With Electronic codebook (ECB) what happens<\/p>\n\n\n\n<p>Skipjack<br>Which algorithm implements an unbalanced Feistel cipher?<\/p>\n\n\n\n<p>Each block of plaintext is XORed with the previous ciphertext block before being encrypted<br>With Cipher-block chaining (CBC) what happens?<\/p>\n\n\n\n<p>The ciphertext block is encrypted then the ciphertext produced is XOR&#8217;d back with the plaintext to produce the current ciphertext block.<br>With Cipher feedback (CFB) what happens?<\/p>\n\n\n\n<p>A block cipher is converted into a stream cipher by generating a keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext<br>What does Output feedback (OFB) do?<\/p>\n\n\n\n<p>CTR\/OFB<br>What modes cannot be used to turn a block cipher into a stream cipher? (select 2)<\/p>\n\n\n\n<p>A fixed size random stream that is added to a block cipher to increase randomness.<br>What is an initialization vector (IV)?<\/p>\n\n\n\n<p>Nonce<br>A number that is used only one time, then discarded is called what?<\/p>\n\n\n\n<p>256 bits<br>What is the largest key size that RC4 can use?<\/p>\n\n\n\n<p>The Lagged Fibonacci generator<br>What is the basis for the FISH algorithm?<\/p>\n\n\n\n<p>Variable length input, fixed length output\/Few collisions\/Not reversible<br>What is required for a hash?<\/p>\n\n\n\n<p>RSA<br>Which of the following is used to encrypt email and create digital signatures? AES\/SHA1\/RSA\/DES<\/p>\n\n\n\n<p>A collision<br>Bob&#8217;s password is hashed, and so is John&#8217;s. Even though they used different passwords, the hash is the same. What is this called?<\/p>\n\n\n\n<p>Salt<br>In relationship to hashing, the term _____refers to random bits that are used as one of the inputs to the hash. Essentially the is intermixed with the message that is to be hashed<\/p>\n\n\n\n<p>MD5<br>This is a 128 bit hash that is specified by RFC 1321. It was designed by Ron Rivest in 1991 to replace an earlier hash function.<\/p>\n\n\n\n<p>FORK256<br>This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged<\/p>\n\n\n\n<p>RSA<br>Which of the following is an asymmetric algorithm that was first publically described in 1977?<\/p>\n\n\n\n<p>Me % n<br>What equation describes the encryption process for RSA?<\/p>\n\n\n\n<p>Elliptic Curve<br>Which of the following is an asymmetric algorithm related to the equation y2 = x3 + Ax + B?<\/p>\n\n\n\n<p>DSA<br>Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIPS 186<\/p>\n\n\n\n<p>X.509<br>Which of the following is the standard for digital certificates?<\/p>\n\n\n\n<p>OCSP<br>Rather than look in a list, one can use a protocol to find revoked certificates. What protocol is that?<\/p>\n\n\n\n<p>Finding any method that is more efficient than brute force.<br>What must occur in order for a cipher to be considered &#8216;broken&#8217;?<\/p>\n\n\n\n<p>Asymmetric<br>____________cryptography uses one key to encrypt a message and a different key to decrypt it.<\/p>\n\n\n\n<p>3<br>If the round function is a cryptographically secure pseudorandom function, then <em>_<\/em> rounds is sufficient to make the block cipher a pseudorandom permutation.<\/p>\n\n\n\n<p>4<br>If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a &#8220;strong&#8221; pseudorandom permutation.<\/p>\n\n\n\n<p>Symmetric Key Encryption Algorithm&#8217;s<br>AES (Advanced Encryption Standard)<br>DES (Data Encryption Standard)<br>IDEA (International Data Encryption Algorithm)<br>Blowfish (Drop-in replacement for DES or IDEA)<br>RC4 (Rivest Cipher 4)<br>RC5 (Rivest Cipher 5)<br>RC6 (Rivest Cipher 6)<br>SkipJack<br>Chameleon<br>Fish<br>Helix<br>SOBER<br>WAKE<\/p>\n\n\n\n<p>AES<br>DES<br>IDEA<br>Blowfish<br>RC5<br>RC6<br>SkipJack<br>What Algorithms are Symmetric Block ciphers?<\/p>\n\n\n\n<p>RC4<br>Chameleon<br>Fish<br>Helix<br>SOBER<br>WAKE<br>What Algorithms are Symmetric Stream ciphers?<\/p>\n\n\n\n<p>AES 128bit blocks and either 128bit &#8211; 192bit or 256bit keys<br>DES 64bit blocks and 56bit keys<br>IDEA 64bit blocks and 128bit keys<br>Blowfish 64bit blocks and anywhere between 32 to 488bit keys<br>RC5 32 &#8211; 64 or 128bit blocks &#8211; 0-2040bit keys and 1-255 rounds<br>RC6 128bit blocks and supports 128 &#8211; 192 &#8211; and 256 up to 2040bit keys<br>SkipJack<br>64bit blocks and 80bit keys<br>What are the key and block sizes for the following Block Cipher algorithms:<br>AES<br>DES<br>IDEA<br>Blowfish<br>RC5<br>RC6<br>SkipJack<\/p>\n\n\n\n<p>Cryptographic Modules<br>FIPS 140<\/p>\n\n\n\n<p>Digital Signatures<br>FIPS 186<\/p>\n\n\n\n<p>AES<br>FIPS 197<\/p>\n\n\n\n<p>Identity Verification<br>FIPS 201<\/p>\n\n\n\n<p>The NSA<br>The de facto standard for cryptography<\/p>\n\n\n\n<p>Suite A or Suite B<br>NSA classifies cryptography first as<\/p>\n\n\n\n<p>Type 1\/2\/3\/or 4 &#8211; with 1 being the highest ranking<br>The NSA also classifies algorithms as<\/p>\n\n\n\n<p>Suite A<br>NSA cryptographies that are not published.<\/p>\n\n\n\n<p>Suite B<br>NSA cryptographies that are published.<\/p>\n\n\n\n<p>Type 1<br>Highest level of encryption algorithms used for classified or sensitive U.S. government information and certified by the NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed.<\/p>\n\n\n\n<p>NSA Type 1 certified Algorithms<br>JUNIPER &#8211; Block cipher<br>MAYFLY &#8211; Asymmetric<br>FASTHASH &#8211; Hashing<br>WALBURN &#8211; High bandwidth link encryption<br>PEGASUS &#8211; Satellite telemetry<br>Are all examples of?<\/p>\n\n\n\n<p>Type 2<br>Algorithns used for unclassified cryptographic equipment, assemblies, or components Endorsed by the NSA for use in telecommunications and automated information systems for the protection of national security information.<\/p>\n\n\n\n<p>Type 2 NSA endorsed algorithms<br>Skipjack (a block cipher)<br>KEA (Key Exchange Algorithm &#8211; Asymmetric)<br>Are all examples of?<\/p>\n\n\n\n<p>Type 3<br>NSA approved algorithms for use with Sensitive But Unclassified (SBU) information on non-national security systems.<\/p>\n\n\n\n<p>Type 3 NSA approved algorithms<\/p>\n\n\n\n<p>NOTE: Some implementations of AES are Type I<br>DES<br>3DES<br>SHA<br>AES<br>Are examples of?<\/p>\n\n\n\n<p>Type 4<br>Algorithms that are registered by the NIST but are not FIPS published and are unevaluated commercial cryptographic equipment\/ assemblies\/ or components that neither NSA nor NIST certify for any Government usage.<\/p>\n\n\n\n<p>DES (block\/key\/rounds)<br>BLOCK SIZE &#8211; 64bit<br>KEY SIZE &#8211; 56bit<br>ROUNDS &#8211; 16<\/p>\n\n\n\n<p>AES (block\/key\/rounds)<br>BLOCK SIZE &#8211; 128bit<br>KEY SIZE &#8211; 128, 192, or 256<br>ROUNDS &#8211; 10,12, or 14<\/p>\n\n\n\n<p>Blowfish (block\/key\/rounds)<br>BLOCK SIZE &#8211; 64bit<br>KEY SIZE &#8211; 32-448 bit<br>ROUNDS &#8211; 16<\/p>\n\n\n\n<p>Twofish (block\/key\/rounds)<br>BLOCK SIZE &#8211; 128bit<br>KEY SIZE &#8211; 1-256bit<br>ROUNDS &#8211; 16<\/p>\n\n\n\n<p>Serpent (block\/key\/rounds)<br>BLOCK SIZE &#8211; 128bit<br>KEY SIZE &#8211; 128,192, or 256bit<br>ROUNDS &#8211; 32<\/p>\n\n\n\n<p>Skipjack (block\/key\/rounds)<br>BLOCK SIZE &#8211; 64bit<br>KEY SIZE &#8211; 80bit<br>ROUNDS &#8211; 32<\/p>\n\n\n\n<p>IDEA (block\/key\/rounds)<br>BLOCK SIZE &#8211; 64bit<br>KEY SIZE &#8211; 128bit<br>ROUNDS &#8211; 8.5<\/p>\n\n\n\n<p>COMMON SYMMETRIC STREAM CIPHERS<br>RC4<br>1-2048 bit key size<\/p>\n\n\n\n<p>COMMON SYMMETRIC STREAM CIPHERS<br>FISH<br>Uses Lagged Fibonacci pseudorandom number generator<\/p>\n\n\n\n<p>COMMON SYMMETRIC STREAM CIPHERS:<br>PIKE<br>Revised version of FISH to address known plaintext attack vulnerabilities<\/p>\n\n\n\n<p>COMMON ASYMMETRIC ENCRYPTION ALGORITHMS:<br>RSA<br>Factors the product of large prime numbers<\/p>\n\n\n\n<p>COMMON ASYMMETRIC ENCRYPTION ALGORITHMS:<br>ECC<br>Uses discrete logarithm characteristics<\/p>\n\n\n\n<p>Used in recent versions of PGP<br>El Gamal<\/p>\n\n\n\n<p>SHA 1 hash key<br>160bit<\/p>\n\n\n\n<p>MD5 hash key<br>128bit<\/p>\n\n\n\n<p>SHA256 hash key<br>256bit<\/p>\n\n\n\n<p>FORK256 hash key<br>256bit<\/p>\n\n\n\n<p>RIPEMD-160 hash key<br>160bit<\/p>\n\n\n\n<p>GOST hash key<br>256bit<\/p>\n\n\n\n<p>TIGER hash key<br>192bit<\/p>\n\n\n\n<p>Key Exchange Algorithms<br>Diffie Hellman (DH)<br>Menezes-Qu-Vanstone (MQV)<br>Key Exchange Algorithm (KEA)<br>Elliptic Curve DH (ECDH)<\/p>\n\n\n\n<p>BLOCK CIPHER MODES:<br>Electronic Code Book (ECB)<br>Each block is encrypted independently, BUT identical plaintext blocks are encrypted in to identical ciphertext blocks. (least secure)<\/p>\n\n\n\n<p>BLOCK CIPHER MODES:<br>Cipher Block Training (CBC)<br>Each block of plaintext is XORed with the previous ciphertext block before being encrypted. To make blocks unique, an initialization vector must be used in the first block<\/p>\n\n\n\n<p>Cipher Feedback (CFB)<br>Allows encryption of partial blocks rather than requiring full blocks for encryption. This eliminates the need to pad a block like in CBC.<\/p>\n\n\n\n<p>The Output Feedback (OFB)<br>Makes a block cipher into a synchronous stream cipher. It generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext.<\/p>\n\n\n\n<p>FORMULA:<br>RSA Encryption<br>C = Me % n<\/p>\n\n\n\n<p>FORMULA:<br>RSA Decryption<br>P = Cd % n<\/p>\n\n\n\n<p>FORMULA:<br>EC<br>y2 = x3 + Ax + B<\/p>\n\n\n\n<p>FORMULA:<br>Symmetric Decryption<br>P = D(k,c)<\/p>\n\n\n\n<p>FORMULA:<br>Symmetric Encryption<br>C = E(k,p)<\/p>\n\n\n\n<p>CALCULATIONS:<br>Modulus Operator Math<br>Divide the first number by the second and return the remainder (MOD)<\/p>\n\n\n\n<p>CALCULATIONS:<br>Caesar<br>Shifting letters of the alphabet a pre-determined amount forward or backwards<\/p>\n\n\n\n<p>CALCULATIONS:<br>ROT<br>Shifting letters of the alphabet a pre-determined amount forward only<\/p>\n\n\n\n<p>Most commonly used format for certificates<br>X.509v3<\/p>\n\n\n\n<p>Must be certified by an authority to verify other participants<br>Root certificate<\/p>\n\n\n\n<p>Requires a unique nonce<br>Rivect Cipher 4 (RC4)<\/p>\n\n\n\n<p>Counter (CTR)<br>generates the key stream with a nonce and incrementing value<\/p>\n\n\n\n<p>What produces the same ciphertext from identical plaintext?<br>Electronic Codebook (ECB)<\/p>\n\n\n\n<p>Vulnerability of DES<br>Key length is too short<\/p>\n\n\n\n<p><strong><em>__<\/em><\/strong> includes a provision for the decryption key in escrow.<br>Skipijack<\/p>\n\n\n\n<p><strong><em>__<\/em><\/strong> combines hashing, data compression, symmetric key, and PKI functions.<br>PGP<\/p>\n\n\n\n<p>Kerchoffs Principle<br>Keys must be absolutely secured.<\/p>\n\n\n\n<p>Hashing functions make birthday attacks possible because___________<br>partial-message collision<\/p>\n\n\n\n<p><strong><em><strong>_<\/strong><\/em><\/strong> can be used to efficiently encrypt large files<br>symmetric encryption<\/p>\n\n\n\n<p>file extension for password protected private key<br>.p12<\/p>\n\n\n\n<p>WEP uses <strong><em>_<\/em><\/strong> to provide integrity.<br>CRC<\/p>\n\n\n\n<p>Vigenere Cipher<br>a method of encrypting text by applying a series of Caesar ciphers based on the letters of a keyword.<\/p>\n\n\n\n<p>Affine cipher<br>converts a letter to a number -&gt; performs a math function -&gt; then back to a letter<\/p>\n\n\n\n<p>Fortuna algorithm uses a <strong><em><strong><em>___<\/em><\/strong><\/em><\/strong> to generate random numbers.<br>Counter (CTR)<\/p>\n\n\n\n<p>Kasaikis method<br>solves a polyalphabetic substitution ciphers by deducing key length<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>A business wants to use keys issued by a trusted third party to demonstrate to potential customers that it is a legitimate organization.<br>Which key is used to sign the certificate issued to the business?<\/li>\n<\/ol>\n\n\n\n<p>Private key of the root CA<br>Public key of the root CA<br>Private key of the company<br>Public key of the company<br>Private key of the root CA<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"2\">\n<li>A business wants to use keys issued by a trusted third party to demonstrate it is a legitimate organization to potential customers.<br>Which key should the business send to potential customers to prove its identity?<\/li>\n<\/ol>\n\n\n\n<p>Private key of the root CA<br>Public key of the root CA<br>Private key of the company<br>Public key of the company<br>Public key of the company<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"3\">\n<li>What should an administrator use to import and export all items written using X.509 that are part of a chain of trust?<\/li>\n<\/ol>\n\n\n\n<p>CER<br>Public Key Cryptography Standard (PKCS) #7<br>Public Key Cryptography Standard (PKCS) #12<br>RTF<br>Public Key Cryptography Standard (PKCS) #12<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Which field displays the hash, or digest, of the certificate in an X.509 certificate?<\/li>\n<\/ol>\n\n\n\n<p>Subject<br>Issuer<br>Version<br>Thumbprint<br>Thumbprint<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\">\n<li>Employee B sends Employee A an encrypted message.<br>What does Employee A use to decrypt the message from Employee B?<\/li>\n<\/ol>\n\n\n\n<p>Employee A&#8217;s private key<br>Employee B&#8217;s private key<br>Employee A&#8217;s public key<br>Employee B&#8217;s public key<br>Employee A&#8217;s private key<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\">\n<li>What is an example of a symmetric algorithm?<\/li>\n<\/ol>\n\n\n\n<p>RSA<br>AES<br>SHA<br>MD5<br>AES<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"7\">\n<li>Which two components involved in performing encryption are known to the party that will perform decryption before symmetric encryption is applied?<br>Choose 2 answers.<\/li>\n<\/ol>\n\n\n\n<p>Cryptographic algorithm<br>Cryptographic key<br>Plaintext content<br>Initialization vector<br>Nonce value<br>Cryptographic algorithm<br>Cryptographic key<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"8\">\n<li>Employee A created a secret key and wants to send it to Employee B without any coworkers being able to decrypt the message.<br>Which key needs to encrypt the message?<\/li>\n<\/ol>\n\n\n\n<p>Employee A&#8217;s public key<br>Employee A&#8217;s private key<br>Employee B&#8217;s public key<br>Employee B&#8217;s private key<br>Employee B&#8217;s public key<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"9\">\n<li>Which type of cipher is ChaCha?<\/li>\n<\/ol>\n\n\n\n<p>Asymmetric<br>Block<br>Stream<br>Hash<br>Stream<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"10\">\n<li>What is the key size for RC4 with WEP?<\/li>\n<\/ol>\n\n\n\n<p>40 bits<br>128 bits<br>256 bits<br>512 bits<br>40 bits<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"11\">\n<li>Which symmetric encryption technique uses a 56-bit key size and a 64-bit block size?<\/li>\n<\/ol>\n\n\n\n<p>AES<br>DES<br>3DES<br>IDEA<br>DES<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"12\">\n<li>Which wireless security standard uses a 128-bit RC4 stream cipher for encrypted communications?<\/li>\n<\/ol>\n\n\n\n<p>WPA<br>WEP<br>VPN<br>GSM<br>WPA<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"13\">\n<li>What defines a prime number?<\/li>\n<\/ol>\n\n\n\n<p>Only has factors of itself and 1<br>Only has factors of itself and 2<br>Evenly divisible by 3.14<br>Evenly divisible by 10<br>Only has factors of itself and 1<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"14\">\n<li>What is 29 mod 12?<\/li>\n<\/ol>\n\n\n\n<p>0<br>3<br>5<br>7<br>5<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"15\">\n<li>What happens to the hash of a file if it is rehashed after the first character of the file is changed?<\/li>\n<\/ol>\n\n\n\n<p>The entire hash is different.<br>The beginning of the hash is altered.<br>The hash is unaltered.<br>The hash algorithm is replaced.<br>The entire hash is different.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"16\">\n<li>What is the length (in bits) of an MD5 hash output?<\/li>\n<\/ol>\n\n\n\n<p>32<br>64<br>128<br>256<br>128<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"17\">\n<li>How many characters are used in an LM hash password?<\/li>\n<\/ol>\n\n\n\n<p>7<br>8<br>14<br>16<br>14<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"18\">\n<li>A Windows credential is identified as follows: user:FDA95FBABC199D22LLD3B435B51876KK:199DDFD4EF0E9CD9KMNC6FE771IL124B8:::<br>What is used to store this password?<\/li>\n<\/ol>\n\n\n\n<p>MD5<br>Bcrypt<br>SHA-512<br>NTLM<br>NTLM<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"19\">\n<li>What is a rainbow table?<\/li>\n<\/ol>\n\n\n\n<p>List of matching usernames and passwords<br>Precompiled list of common words<br>List of commonly used passwords<br>Precompiled list of hash values<br>Precompiled list of common words<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"20\">\n<li>Which mode encrypts each group with the same key, leaving each group independent of the others?<\/li>\n<\/ol>\n\n\n\n<p>ECB<br>CBC<br>CFB<br>OFB<br>ECB<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"21\">\n<li>Which mode of block encryption results in the same outcome for matching blocks of a plaintext message?<\/li>\n<\/ol>\n\n\n\n<p>Electronic Code Book (ECB)<br>Output feedback (OFB)<br>Cipher block chaining (CBC)<br>Cipher feedback (CFB)<br>ECB<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"22\">\n<li>How does CBC mode encryption function?<\/li>\n<\/ol>\n\n\n\n<p>Encrypts each block with the same key, where each block is independent of the others<br>Uses an initialization vector (IV) to encrypt the first block, then uses the result of the encryption to encrypt the next block<br>Uses a self-synchronizing stream on the blocks, where the initialization vector (IV) is encrypted and XORed with the data stream<br>Converts from block into stream, then uses a counter value and a nonce to encrypt the data<br>Uses an initialization vector (IV) to encrypt the first block, then uses the result of the encryption to encrypt the next block<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"23\">\n<li>Which encryption mode always produces the same result for the same plaintext?<\/li>\n<\/ol>\n\n\n\n<p>CBC<br>ECB<br>CFB<br>CTR<br>ECB<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"24\">\n<li>Which information protection method has an 80-bit key and operates on 64-bit data blocks?<\/li>\n<\/ol>\n\n\n\n<p>Skipjack<br>IDEA<br>DES<br>Twofish<br>Skipjack<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"25\">\n<li>How many transformation rounds does AES use with a 192-bit key?<\/li>\n<\/ol>\n\n\n\n<p>10<br>12<br>14<br>16<br>12<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"26\">\n<li>How many transformation rounds does AES use with a 128-bit key?<\/li>\n<\/ol>\n\n\n\n<p>10<br>12<br>14<br>16<br>10<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"27\">\n<li>Which encryption algorithm did the National Institute of Standards and Technology (NIST) designate as a specification for the encryption of electronic information?<\/li>\n<\/ol>\n\n\n\n<p>IDEA<br>DES<br>3DES<br>AES<br>AES<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"28\">\n<li>A security analyst decrypted a data set with the same key that originally encrypted the data set.<br>Which cryptographic operation did the analyst use?<\/li>\n<\/ol>\n\n\n\n<p>Asymmetric<br>Symmetric<br>Hashing<br>Kerberos<br>Symmetric<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"29\">\n<li>What should be used when large amounts of data need to be encrypted and decrypted for secure storage based on groupings of 128, 192, or 256 bits?<\/li>\n<\/ol>\n\n\n\n<p>Symmetric stream<br>Symmetric block<br>Asymmetric public key<br>Asymmetric private key<br>Symmetric block<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"30\">\n<li>Why is symmetric stream used to encrypt video when speed is a major concern?<\/li>\n<\/ol>\n\n\n\n<p>It signs files and encrypts that hash of the file to verify integrity and authenticity.<br>It encrypts and decrypts data in blocks of characters at a time with a complex algorithm.<br>It encrypts a small amount of information, which is decrypted with a private key.<br>It uses the same key to encrypt and decrypt large amounts of media.<br>It uses the same key to encrypt and decrypt large amounts of media.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"31\">\n<li>Why should an asymmetric public key be used to encrypt a symmetric key that is being sent to one person?<\/li>\n<\/ol>\n\n\n\n<p>It uses the same key to encrypt and decrypt large amounts of media, one bit at a time.<br>It encrypts and decrypts data in blocks of characters at a time with a complex algorithm.<br>It encrypts a small amount of information, which is decrypted with the corresponding private key.<br>It signs files and encrypts the hash of the file to verify integrity and authenticity.<br>It encrypts a small amount of information, which is decrypted with the corresponding private key.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"32\">\n<li>Which type of attacks are Diffie-Hellman methods vulnerable to?<\/li>\n<\/ol>\n\n\n\n<p>Man-in-the-middle<br>Brute-force<br>Rainbow<br>Dictionary<br>Man-in-the-middle<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"33\">\n<li>Which mechanism mitigates a copy-and-paste attack when using AES?<\/li>\n<\/ol>\n\n\n\n<p>Electronic Code Book (ECB)<br>Output feedback (OFB) loop<br>Message digest 6 (MD6)<br>Secure Hash Algorithm 1 (SHA-1)<br>Output feedback (OFB) loop<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"34\">\n<li>Which mechanism can be used to ensure perfect forward secrecy during key exchange when using symmetric encryption?<\/li>\n<\/ol>\n\n\n\n<p>MD5<br>ECDSA<br>ECDH<br>SHA-2<br>ECDH<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"35\">\n<li>Which encryption component ensures that the compromise of a long-term key prevents the compromise of any previous session keys?<\/li>\n<\/ol>\n\n\n\n<p>Integrity check<br>Client hello<br>Server hello<br>Forward secrecy<br>Forward secrecy<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"36\">\n<li>What can XOR use as a pseudorandom number to create unique ciphertext?<\/li>\n<\/ol>\n\n\n\n<p>Symmetric key<br>Message digest<br>Permanent password<br>Initialization vector<br>Initialization vector<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"37\">\n<li>How does cipher block chaining (CBC) create randomness in a second block after encrypting the first block with an initialization vector (IV)?<\/li>\n<\/ol>\n\n\n\n<p>Uses the results of the IV to encrypt the next block<br>Increments the IV to encrypt the next block<br>Creates a new, random IV to encrypt the next block<br>Generates a new IV to encrypt the next block<br>Uses the results of the IV to encrypt the next block<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"38\">\n<li>How is information about Bitcoin transactions stored?<\/li>\n<\/ol>\n\n\n\n<p>Command and control center<br>Platform as a service in the cloud<br>Infrastructure as a service in the cloud<br>Distributed peer-to-peer network<br>Distributed peer-to-peer network<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"39\">\n<li>What is one of the primary characteristics of a blockchain in the context of Bitcoin?<\/li>\n<\/ol>\n\n\n\n<p>Adding blocks to a blockchain is computationally expensive.<br>The security of the chain in a blockchain is independent of its length.<br>Transactions between each block are chained.<br>Transactions within each block are chained.<br>Transactions between each block are chained.<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"40\">\n<li>What is the length (in bits) of the private key used to sign transactions and associated with an individual wallet in the context of Bitcoin?<\/li>\n<\/ol>\n\n\n\n<p>64<br>128<br>256<br>512<br>256<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"41\">\n<li>Which certificate management process involves key recovery?<\/li>\n<\/ol>\n\n\n\n<p>Initialization<br>Issued<br>Cancellation<br>Hold<br>Issued<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"42\">\n<li>Which task does a root CA perform before publishing its own certificate?<\/li>\n<\/ol>\n\n\n\n<p>Encrypting it with its private key<br>Encrypting it with its public key<br>Signing it with its private key<br>Signing it with its public key<br>Signing it with its private key<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"43\">\n<li>Which algorithm is used to generate the thumbprint of a certificate?<\/li>\n<\/ol>\n\n\n\n<p>RSA<br>3DES<br>AES<br>SHA-1<br>SHA-1<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"44\">\n<li>Large volumes of plaintext need to be encrypted, and the encryption keys need to be securely distributed.<br>Which approach should be used for encryption and distribution?<\/li>\n<\/ol>\n\n\n\n<p>Encrypt by using symmetric keys and distribute by using asymmetric keys<br>Encrypt by using asymmetric keys and distribute by using symmetric keys<br>Encrypt by using symmetric keys and distribute by using symmetric keys<br>Encrypt by using asymmetric keys and distribute by using asymmetric keys<br>Encrypt by using symmetric keys and distribute by using asymmetric keys<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"45\">\n<li>What is the role of a key in asymmetric encryption and decryption?<\/li>\n<\/ol>\n\n\n\n<p>A public key is used for both encryption and decryption.<br>A private key is used for both encryption and decryption.<br>A public key is used for encryption, and a private key is used for decryption.<br>A private key is used for encryption, and a public key is used for decryption.<br>A public key is used for encryption, and a private key is used for decryption.<\/p>\n\n\n\n<p>We have an expert-written solution to this problem!<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"46\">\n<li>A security analyst is validating the integrity and authenticity of a data transaction.<br>Which PKI component is being used?<\/li>\n<\/ol>\n\n\n\n<p>Digital certificate<br>Digital signature<br>Asymmetric encryption<br>Symmetric encryption<br>Digital signature<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"47\">\n<li>Which PKI component generates digital certificates?<\/li>\n<\/ol>\n\n\n\n<p>Certificate signing request (CSR)<br>Certificate policy (CP)<br>Certificate revocation list (CRL)<br>Certificate authority (CA)<br>Certificate authority (CA)<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"48\">\n<li>What is the maximum length (in bits) of encryption keys used by the WEP protocol?<\/li>\n<\/ol>\n\n\n\n<p>40<br>56<br>128<br>256<br>40<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"49\">\n<li>What is a difference between WPA-Enterprise and WPA-Personal?<\/li>\n<\/ol>\n\n\n\n<p>Support for Temporal Key Integrity Protocol<br>Support for an authentication server<br>Use of a session key<br>Use of a 48-bit initialization vector<br>Support for an authentication server<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"50\">\n<li>Which cipher is used with WEP?<\/li>\n<\/ol>\n\n\n\n<p>RC5<br>RC4<br>TKIP<br>AES<br>RC4<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"51\">\n<li>How does TKIP improve WPA over WEP?<\/li>\n<\/ol>\n\n\n\n<p>Hashes the initialization vector and secret key<br>Implements a RADIUS server<br>Implements an authentication server<br>Creates an AES encryption key<br>Hashes the initialization vector and secret key<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"52\">\n<li>An administrator has configured a virtual private network (VPN) connection utilizing IPsec tunnel mode with Encapsulating Security Payload (ESP) between the corporate office and a remote office.<br>Where can the packets be inspected by intrusion detection systems (IDSs) and virus scanners?<\/li>\n<\/ol>\n\n\n\n<p>Only at the headquarters<br>Only at the offsite location<br>At the headquarters and the offsite location<br>Between the headquarters and the offsite location<br>At the headquarters and the offsite location<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"53\">\n<li>Which default port must be open for the IPsec key exchange to be successful?<\/li>\n<\/ol>\n\n\n\n<p>UDP 162<br>TCP 389<br>TCP 465<br>UDP 500<br>UDP 500<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"54\">\n<li>Which protocol indicates the virtual private network (VPN) is using Authentication Header (AH)?<\/li>\n<\/ol>\n\n\n\n<p>48<br>50<br>51<br>58<br>51<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"55\">\n<li>Which cipher uses a grid to map letters into numeric values?<\/li>\n<\/ol>\n\n\n\n<p>Bifid<br>SHA-1<br>Caesar<br>Vigen\u00e8re<br>Bifid<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"56\">\n<li>Which cipher uses a five-by-five matrix with nonrepeating characters?<\/li>\n<\/ol>\n\n\n\n<p>Playfair<br>Rail code<br>Pigpen<br>Vigen\u00e8re<br>Playfair<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"57\">\n<li>What does a frequency analysis attack to break encryption involve?<\/li>\n<\/ol>\n\n\n\n<p>Analyzing ciphertext to identify text variation and comparing the text to standard English characters<br>Performing an exhaustive search to attempt every possible mapping or key<br>Interfering between two parties and sometimes intercepting or modifying data in the communication stream<br>Identifying part of the ciphertext and the corresponding plaintext<br>Analyzing ciphertext to identify text variation and comparing the text to standard English characters<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"58\">\n<li>Which technique should a security analyst use to determine the key length in a Vigen\u00e8re cipher?<\/li>\n<\/ol>\n\n\n\n<p>Frequency analysis<br>Brute force<br>Kasiski examination<br>Known plaintext<br>Kasiski examination<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"59\">\n<li>Which attack tries every combination of letters, numbers, and special characters?<\/li>\n<\/ol>\n\n\n\n<p>Rainbow table<br>Birthday<br>Dictionary<br>Brute-force<br>Brute-force<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"60\">\n<li>How does a dictionary attack break a cipher?<\/li>\n<\/ol>\n\n\n\n<p>Factors the prime numbers used within an RSA algorithm<br>Looks for rollover of the same value for an IV<br>Takes a list of the most common words and tries each entry<br>Matches hash values back to the original plaintext<br>Takes a list of the most common words and tries each entry<\/p>\n\n\n\n<p>What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?<\/p>\n\n\n\n<p>It initiates an ARP request.<\/p>\n\n\n\n<p>It broadcasts the frame out of all ports on the switch.<\/p>\n\n\n\n<p>It notifies the sending host that the frame cannot be delivered.<\/p>\n\n\n\n<p>It forwards the frame out of all ports except for the port at which the frame was received.<br>It forwards the frame out of all ports except for the port at which the frame was received.<\/p>\n\n\n\n<p>What are two features of ARP? (Choose two.)<\/p>\n\n\n\n<p>If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.*<\/p>\n\n\n\n<p>An ARP request is sent to all devices on the Ethernet LAN and contains the IP address of the destination host and its multicast MAC address.<\/p>\n\n\n\n<p>When a host is encapsulating a packet into a frame, it refers to the MAC address table to determine the mapping of IP addresses to MAC addresses.<\/p>\n\n\n\n<p>If no device responds to the ARP request, then the originating node will broadcast the data packet to all devices on the network segment.<\/p>\n\n\n\n<p>If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.<br>If a host is ready to send a packet to a local destination device and it has the IP address but not the MAC address of the destination, it generates an ARP broadcast.<\/p>\n\n\n\n<p>If a device receiving an ARP request has the destination IPv4 address, it responds with an ARP reply.<\/p>\n\n\n\n<p>Which encryption standard uses the same key to encrypt and decrypt messages?<br>Symmetric Key Encryption<\/p>\n\n\n\n<p>Which algorithm is designated as a Type 2 product by the National Security Agency (NSA)?<br>SKIPJACK<\/p>\n\n\n\n<p>What is the most commonly used format for certificates?<br>X.509 v3 Version 3<\/p>\n\n\n\n<p>What is referenced to determine if a certificate has been revoked?<br>Certificate Revocation List (CRL)<\/p>\n\n\n\n<p>What needs to be installed on end users&#8217; computers to allow them to trust applications that have been digitally signed by the developer?<br>Sender&#8217;s public key (DEVELOPER&#8217;s)<\/p>\n\n\n\n<p>Which type of certificate must be certified by an authority to verify it with other participants?<br>Public Certificate<\/p>\n\n\n\n<p>What is an attribute of the Rivest Cipher 4 (RC4) algorithm?<br>It requires a unique nonce. (# used ONCE)<\/p>\n\n\n\n<p>Which mode generates the key stream with a nonce and incrementing value?<br>Counter (CTR)<\/p>\n\n\n\n<p>Generates the next keystream block by encrypting successive values of a &#8220;counter&#8221;<\/p>\n\n\n\n<p>Which mode is a stream algorithm that concatenates an incrementing value with a nonce?<br>Counter (CTR)<\/p>\n\n\n\n<p>Which key would an administrator use to encrypt data so only the CEO can decrypt it?<br>CEO&#8217;s public key<\/p>\n\n\n\n<p>Remember, when a specific person in an organization is the ONLY one you want to DECRYPT something, you must have their PUBLIC key<\/p>\n\n\n\n<p>What is the result of a hash function?<br>Digest<\/p>\n\n\n\n<p>What is used to efficiently encrypt large files?<br>Symmetric encryption<\/p>\n\n\n\n<p>An administrator needs to encrypt the following word with the Atbash cipher:<\/p>\n\n\n\n<p>security<\/p>\n\n\n\n<p>Which ciphertext is correct?<br>hvxfirgb<\/p>\n\n\n\n<p>Remember this is a Mono-Alphabet Substitution Cipher that replaces each character with its corresponding alphabet character IE: A=Z, B=Y, C=X, etc\u2026<\/p>\n\n\n\n<p>Which cryptographic algorithm has a 128-bit HASH size?<br>Message Digest Algorithm 5 (MD5)<\/p>\n\n\n\n<p>Which characteristic makes a hashing function suitable for use in signature schemes?<br>Collision resistance<\/p>\n\n\n\n<p>Of the many properties that a good hash function should have, the one that is mentioned most often is collision resistance.<\/p>\n\n\n\n<p>Which attribute of a hashing function makes a birthday attack possible?<br>Partial-message collision<\/p>\n\n\n\n<p>The partial-message collision attacks all rely on birthday attacks<\/p>\n\n\n\n<p>Which hash algorithm produces a 160-bit output value?<br>SHA-1<\/p>\n\n\n\n<p>What does cipher block chaining (CBC) use with the key to encrypt subsequent blocks of plaintext?<br>Previous generated ciphertext<\/p>\n\n\n\n<p>Which mode produces the same ciphertext from two identical plaintext blocks?<br>Electronic codebook (ECB)<\/p>\n\n\n\n<p>There are many situations in which large blocks of text are repeated. For example, this chapter contains the words &#8220;ciphertext block&#8221; many times. If two of the occurrences happen to line up on a block boundary, then a plaintext block value will be repeated<\/p>\n\n\n\n<p>Which encryption mode is least secure?<br>Electronic codebook (ECB)<\/p>\n\n\n\n<p>What is the mathematical formula used for symmetric decryption?<br>P = E (K,C)<\/p>\n\n\n\n<p>P = Plain text<br>E = Encryption\/Decryption<br>K = Key<br>C = Cipher Text<\/p>\n\n\n\n<p>Remember, if you DECRYPT something, you want to know the PLAIN TEXT<\/p>\n\n\n\n<p>Which algorithm relies on factoring the product of large prime numbers?<br>RSA<\/p>\n\n\n\n<p>Which encryption technology is a serial combination of hashing, data compression, symmetric-key cryptography, and public key infrastructure (PKI) and can be used for encrypting texts, emails, files, and directories or for full disk encryption?<br>Pretty Good Privacy (PGP)<\/p>\n\n\n\n<p>Remember, this is NOT an ALGORITHM, but\u2026 it uses other established Asymmetric and Symmetric Algorithms<\/p>\n\n\n\n<p>Which concept stipulates that algorithms should be openly shared and scrutinized, but keys must be absolutely secured?<br>Kerckhoffs&#8217;s principle<\/p>\n\n\n\n<p>Which encryption process minimizes known plaintext attacks against Advanced Encryption Standard (AES)?<br>Randomizing the initialization vector<\/p>\n\n\n\n<p>What prevents a rainbow table attack during the encryption process?<br>Salting<\/p>\n\n\n\n<p>This is simply a random number that is stored alongside the data that was encrypted with the password.<\/p>\n\n\n\n<p>Which factor increases the required number of attempts in a brute-force attack?<br>Larger key size<\/p>\n\n\n\n<p>IE: Remember brute force is simply trying every possible key. DES has a maximum key size (also called a key space) of 256. A modern computer system can break this in a reasonable amount of time.<\/p>\n\n\n\n<p>What is a vulnerability of the Data Encryption Standard (DES)?<br>Key length is too short.<\/p>\n\n\n\n<p>Which block size does the Advanced Encryption Standard (AES) use?<br>128<\/p>\n\n\n\n<p>Which block algorithm includes a provision for the decryption key kept in a key escrow?<br>Skipjack<\/p>\n\n\n\n<p>Developed by the NSA and was designed for the clipper chip A chip with built-in encryption The decryption key was to be kept in a key escrow in case, law enforcement need to decrypt data without the computer owner&#8217;s cooperation<\/p>\n\n\n\n<p>What is the result of A|B and B|C?<br>A|C<\/p>\n\n\n\n<p>How is X mod N if N = PQ represented in number theory?<br>( X mod P, X mod Q)<\/p>\n\n\n\n<p><em>X mod P X mod Q<\/em><\/p>\n\n\n\n<p>What is the outcome when using the binary AND function on 11011 and 10100?<br>10000<\/p>\n\n\n\n<p>Which mode does the Fortuna algorithm use to generate random numbers?<\/p>\n\n\n\n<p>A sequence of numbers<br>Counter (CTR)<\/p>\n\n\n\n<p>It is a group of PRNGs = PseudoRandom Number Generators<\/p>\n\n\n\n<p>What is a potential weakness of a pseudo-random number generator (PRNG)?<br>Same INTERNAL state used more than once<\/p>\n\n\n\n<p>Another problem arises if the same PRNG state is used more than once. This can happen when two or more virtual machines (VMs) are booted from the same state and read the same seed file from disk.<\/p>\n\n\n\n<p>Which key combination is used to decrypt and verify a digital signature?<br>Recipient&#8217;s private key to decrypt and sender&#8217;s public key to verify the signature<\/p>\n\n\n\n<p>Which key is used to sign a message or a message digest?<br>Sender&#8217;s private key<\/p>\n\n\n\n<p>Which key does the certificate authority (CA) use to digitally sign keys that it issues?<br>Server&#8217;s private key<\/p>\n\n\n\n<p>What does an end user need to verify a Rivest-Shamir -Adleman (RSA) digitally signed message?<br>Sender&#8217;s public key<\/p>\n\n\n\n<p>What is used when creating a digital signature, using public key infrastructure (PKI)?<br>The private key of the person creating the message<\/p>\n\n\n\n<p>Which feature in Wired Equivalent Privacy (WEP) provides integrity control when sending packets over a wireless network?<br>Cyclic redundancy check<\/p>\n\n\n\n<p>WEP &#8211; uses the stream cipher RC4 to secure the data and a CRC-32 checksum for error checking<\/p>\n\n\n\n<p>A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and storage devices to detect accidental changes to raw data.<\/p>\n\n\n\n<p>Which feature of Wi-Fi Protected Access (WPA) increases the difficulty of attack?<br>Temporal Key Integrity Protocol (TKIP)<\/p>\n\n\n\n<p>Which two concerns does the use of Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) address?<\/p>\n\n\n\n<p>Choose 2 answers<br>Confidentiality<\/p>\n\n\n\n<p>Integrity<\/p>\n\n\n\n<p>Which extension designates a file containing a password-protected private key?<br>.p12<\/p>\n\n\n\n<p>Which part of the public key infrastructure (PKI) defines how a credential is used?<br>Certificate policy (CP)<\/p>\n\n\n\n<p>Which part of the public key infrastructure (PKI) is used to ensure that the format for a credential can be used by anyone on the internet?<br>Public Key Cryptography Standards (PKCS)<\/p>\n\n\n\n<p>Which solution is used in a Layer 2 Tunneling Protocol (L2TP) virtual private network (VPN) to secure data in transmission?<br>Internet Protocol Security (IPsec)<\/p>\n\n\n\n<p>Which network-based virtual private network (VPN) prevents unauthorized logins by preventing packet retransmission?<br>IP security (IPsec)<\/p>\n\n\n\n<p>Which port does Secure Socket Tunneling Protocol (SSTP) use?<br>443<\/p>\n\n\n\n<p>HTTPS:<\/p>\n\n\n\n<p>What is a common problem with using pre-shared keys (PSKs)?<br>Secure key exchange<\/p>\n\n\n\n<p>What is a concern with storing long-term secrets on media or memory?<br>Integrity<\/p>\n\n\n\n<p>Which cipher uses a series of ciphers based on a keyword?<br>Vigen\u00e8re<\/p>\n\n\n\n<p>Which substitution cipher system reverses the sequence of the alphabet?<br>Atbash<\/p>\n\n\n\n<p>Which type of cipher converts a letter to a number, passes it through a mathematical function, and then converts it back to a letter?<br>Affine<\/p>\n\n\n\n<p>Which technique solves polyalphabetic substitution ciphers by deducing the key length?<br>Kasiski&#8217;s method<\/p>\n\n\n\n<p>Which cryptanalysis technique examines ciphertext for recurring letter combinations?<br>Frequency analysis<\/p>\n\n\n\n<p>Which cryptanalysis method involves a person being tricked into encrypting a set of known messages?<br>Chosen plaintext attack<\/p>\n\n\n\n<p>Remember, it is a set of KNOWN MESSAGES, which are written in Plain Text<\/p>\n\n\n\n<p>Which technique does related-key cryptanalysis use to decipher a message?<br>Messages are encrypted using different secrets, and the analyst compares the messages to figure out how the algorithm works.<\/p>\n\n\n\n<p>Which type of cryptography is being used when the author uses secret inks?<br>Steganography<\/p>\n\n\n\n<p>What is the hidden message in a steganographic communication?<br>Payload<\/p>\n\n\n\n<p>Payload = The data to be covertly communicated, the message you wish to hide<br>Carrier = The signal, stream, or data file into which the payload is hidden<br>Channel = The type of medium used. This may be still photos, video, or sound files<\/p>\n\n\n\n<p>Finding any method to decrypt the message that is more efficient that simple brute force attempts.<br>Breaking Ciphers<\/p>\n\n\n\n<p>Simply trying every possible key to decrypt a message<br>Brute Force<\/p>\n\n\n\n<p>Using other techniques to attempt to derive the key, can be used to test the efficacy of a cryptographic algorithm. Frequently used to test hash algorithms for collisions.<br>Cryptanalysis<\/p>\n\n\n\n<p>The most basic tool for breaking classic ciphers like the Caesar and Vigenere Ciphers.<br>Analysis the frequency of certain letters of the alphabet to derive some information about the key that was used.<br>Frequency Analysis<\/p>\n\n\n\n<p>This method is used for attacking polyalphabetic substitution ciphers, such as the Vigenere Cipher.<br>Used to deduce the length of the keyword used in the polyalphabetic substitution, the longer ciphertext the more effective this method becomes.<br>Kasiski Method or Test<\/p>\n\n\n\n<p>The attacker obtains ciphertexts corresponding to the set of plaintexts of his own choosing.<br>This is difficult but not impossible<br>Chosen Plaintext Attack<\/p>\n\n\n\n<p>The attacker only has access to a collection of ciphertexts. It is much more likely then a known plaintext attack, but is also the most difficult. This attack is completely successful if the corresponding plaintexts can be deduced, or the key. Obtaining any information about the underlying plaintext is still considered a success.<br>Chosen Ciphertext Only<\/p>\n\n\n\n<p>Like a chosen-plaintext attack, except the attacker can obtain ciphertext encrypted under two different keys. Very useful if you can obtain the plaintext and matching ciphertext.<br>Related-key Attack<\/p>\n\n\n\n<p>Based on finding affine approximations to the action of the cipher.<br>Most commonly used on block ciphers.<br>Known as a plaintext attack and uses linear approximations to describe the behavior of the block cipher.<br>You can use this method to slowly re-create the key that was used.<br>Eventually you will have an equation in the form of:<br>Pi1 \u2295 Pi2 \u2295 . . . \u2295 Cj1 \u2295 Cj2 \u2295 . . . = Kk1 \u2295 Kk2 \u2295 . . .<br>Linear Cryptanalysis<\/p>\n\n\n\n<p>A form of cryptanalysis applicable to symmetric key algorithms<br>The examination of differences in an input and how that input affects the resultant differences in output. Originally worked only with chosen plaintext, could also work with known plaintext and ciphertext only<br>Differential Cryptanalysis<\/p>\n\n\n\n<p>This attack in particularly useful against block ciphers.<br>Based on substitution-permutation networks, an extension of differential cryptanalysis.<br>Integral Cryptanalysis<\/p>\n\n\n\n<p>Cryptanalysis Resource<br>The number of primitive operations which much be performed.<br>Could be basic computer instructions like addition, XOR, shift or even entire encryption methods<br>Time<\/p>\n\n\n\n<p>Cryptanalysis Resource<br>The amount of storage required to perform the attack<br>Memory<\/p>\n\n\n\n<p>Cryptanalysis Resource<br>The quantity of plaintexts and ciphertexts required<br>Data<\/p>\n\n\n\n<p>Cryptanalysis Success<br>The attacker deduces the secret key<br>Total Break<\/p>\n\n\n\n<p>Cryptanalysis Success<br>The attacker discovers a functionally equivalent algorithm for encryption and decryption without learning the key<br>Global Deduction<\/p>\n\n\n\n<p>Cryptanalysis Success<br>The attacker discovers additional plaintexts or ciphertexts not previously known<br>Instance Local Deduction<\/p>\n\n\n\n<p>Cryptanalysis Success<br>The attacker gains some Shannon Information about plaintexts or ciphertexts not previously known<br>Information Deduction<\/p>\n\n\n\n<p>Cryptanalysis Success<br>The attacker can distinguish the cipher from a random permutation<br>Distinguishing Algorithm<\/p>\n\n\n\n<p>Uses pre-calculated hashes of all possible passwords within a certain character space.<br>Particularly useful when trying to crack hashes.<br>Ophrack is a popular tool that depends on this.<br>Rainbow Tables<\/p>\n\n\n\n<p>These are usually the encryption of a message digest with the senders private key.<br>In order to verify them, the recipient uses the senders public key.<br>They are considered good if they provide the following.<br>Authentication<br>Integrity<br>Non-repudiation<br>Digital Signature<\/p>\n\n\n\n<p>It is a digital document that contains a public key and some information to allow your system to verify where they key came from.<br>This is the most common way to distribute pubic keys in asymmetric cryptography.<br>Digital Certificate<\/p>\n\n\n\n<p>uses asymmetric key pairs and combines software, encryption and services to provide a means of protecting the security of business communications and transactions.<br>PKI (Public Key Infrastructure)<\/p>\n\n\n\n<p>They are in place by the RSA to ensure uniform certificate management throughout the internet<br>PKCS (Public Key Cryptography Standards)<\/p>\n\n\n\n<p>A certificate is a digital representation of information that identifies you as a relevant entity by a?<br>Trusted Third Party (TTP)<\/p>\n\n\n\n<p>This is an entity trusted by one or more users to manage certificates<br>CA (Certificate Authority)<\/p>\n\n\n\n<p>Used to take the burden off of a CA by handling verification prior to certificates being issues. They act as a proxy between user and CA. They receive requests, authenticate them and forward them to the CA<br>RA (Registration Authority)<\/p>\n\n\n\n<p>is a set of rules that defines how a certificate may be used.<br>CP (Certificate Policy)<\/p>\n\n\n\n<p>An international standard for the format and information contained in a certificate. The most common type of digital certificate in the world.<br>Relied on by S\/MIME<br>Contains your name, info about you and signature of the person who issued the certificate<br>X.509<\/p>\n\n\n\n<p>List of certificates issued by a CA that are no longer valid<br>CRL (Certificate Revocation List)<\/p>\n\n\n\n<p>CRL Distribution Method:<br>CA automatically sends the CRL out at regular intervals<br>PUSH Model<\/p>\n\n\n\n<p>CRL Distribution Method:<br>The CRL is downloaded from the CA by those who want to see verify a certificate. This is the end users responsibility<br>Pull Method<\/p>\n\n\n\n<p>Is a Base64 encoded DER certificate, enclosed between<br>&#8220;&#8212;&#8212; BEGIN CERTIFICATE &#8212;&#8212;&#8221; AND<br>&#8220;&#8212;&#8212; END CERTIFICATE &#8212;&#8212;&#8220;<br>.pem<\/p>\n\n\n\n<p>Usually in binary DER form, but Base64-encoded certificates are common too.<br>.cer, .crt, .der<\/p>\n\n\n\n<p>PKCS#7 Signed Data structure without data just certificate(s) or CRL(s)<br>.p7b, p7c<\/p>\n\n\n\n<p>PKCS#12, may contain certificate(s) pubic and private (password protected) keys.<br>.p12<\/p>\n\n\n\n<p>Predecessor of PKCS#12 usually contains data in PKCS#12 format with files generated in IIS<br>.pfx<\/p>\n\n\n\n<p>A newer protocol for verifying certificates in real-time<br>Online Certificate Status Protocol (OSCP)<\/p>\n\n\n\n<p>Determining the path between X.509 digital certificates and a trusted root<br>Delegated Path Discovery<\/p>\n\n\n\n<p>The validation of the path to the trusted root according to a particular validation policy<br>Delegated Path Validation<\/p>\n\n\n\n<p>Setup and initialization<br>Administration<br>Cancelation<br>are the phases of?<br>Key life-cycle<\/p>\n\n\n\n<p>Registration<br>Key pair Generation<br>Certificate Generation<br>Certificate Dissemination<br>Setup and Initialization Phase<\/p>\n\n\n\n<p>Key storage<br>Certificate retrieval and validation<br>Backup or escrow<br>Recovery<br>Administration Phase<\/p>\n\n\n\n<p>Expiration<br>Renewal<br>Revocation<br>Suspension<br>Destruction<br>Cancelation and History Phase<\/p>\n\n\n\n<p>Person who can recover keys from keystore on behalf of a user<br>Highly-trusted person<br>Issue recovery agent certificates<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>EFS Recovery Agent certificate<\/li>\n\n\n\n<li>Key Recovery Agent Certificate<br>Update and Path Vulnerabilities<\/li>\n<\/ul>\n\n\n\n<p>The most basic form of authentication<br>User name and password are transmitted over the network and compared to a table of corresponding name-password pairs.<br>Name-password pair table is encrypted, but the transmission of the passwords is done in clear text, unencrypted.<br>It is the basic authentication feature for HTTP<br>PAP (Password Authentication Protocol)<\/p>\n\n\n\n<p>This is a proprietary version of PAP, it is somewhat more secure then PAP because username and passwords are both encrypted when they are sent over the network.<br>S-PAP (Shiva Password Authentication Protocol)<\/p>\n\n\n\n<p>After a connecting is established the authenticator will &#8220;challenge&#8221; the requestor.<br>The requestor responds with a calculated has function.<br>The authenticator checks the response against its own calculation of the expected hash function. If they match the authenticator acknowledges the request, otherwise the connection is terminated.<br>This processes is repeated at random intervals.<br>CHAP (Challenge-Handshake Authentication Protocol)<\/p>\n\n\n\n<p>Most widely used authentication protocol, mainly within Microsoft systems. Invented at MIT and is named for the three-headed mythical dog that was reputed to guard the gates of Hades.<br>Uses symmetric cryptography, with authentication performed on UDP port 88<br>Kerberos<\/p>\n\n\n\n<p>A server or client that Kerberos can assign tickets to<br>Principal<\/p>\n\n\n\n<p>This server authorizes the principal and connects them to the ticket granting server<br>Authentication Server (AS)<\/p>\n\n\n\n<p>This server provides tickets to the principal after they are authenticated and connected<br>Ticket Granting Server (TGS)<\/p>\n\n\n\n<p>Provides the initial ticket to the principal and handles TGS requests. Typically runs both the AS and TGS services<br>Key Distribution Center (KDC)<\/p>\n\n\n\n<p>A boundary within and organization, each separate boundary has its own AS and TGS<br>Realm<\/p>\n\n\n\n<p>This server grants tickets to remote realms<br>Remote Ticket Granting Server (RTGS)<\/p>\n\n\n\n<p>A ticket that is granted during the authentication process<br>Ticket Granting Ticket (TGT)<\/p>\n\n\n\n<p>Used to authenticate to the server. Contains client identity, session key, timestamp and a checksum. It is encrypted with the servers keys<br>Ticket<\/p>\n\n\n\n<p>A temporary encryption key<br>Session Key<\/p>\n\n\n\n<p>Proves the session keys was recently created, typically expires within five minutes<br>Authenticator<\/p>\n\n\n\n<p>Step 1: User sends credentials to the AS<br>Step 2: AS authenticates user<br>Step 3: The AS contacts the TGT that is sent to the users computer<br>Step 4: The users computer presents the TGT back to the TGS to request access to a specific network resource. The TGS uses the AS to authenticate the ticket. if it is authentic then a resource ticket and session key are sent to the users computer<br>Step 5: The users presents the ticket\/session key to the resource<br>Step 6: The resource verifies the ticket\/session key with the TGS<br>Step 7: The user is authorized access to the resource<br>Kerberos Process<\/p>\n\n\n\n<p>By itself it is not an algorithm, but uses other well established asymmetric and symmetric algorithms. This software products was developed to make encryption and decryption readily usable by end users.<br>Usually associated with email encryption<br>Can be used to create certificates, but unlike X.509 they contain multiple signatures and define there own format<br>Pretty Good Privacy (PGP)<\/p>\n\n\n\n<p>Wi-Fi Encryption method that uses a stream cipher RC4 128 or 156 bits.<br>WEP (Wired Equivalent Privacy)<\/p>\n\n\n\n<p>Uses a Pre-shared key mode<br>Designed for home and small office networks<br>Does not require an Authentication Server<br>Each wireless device authenticates using the same 256 bit key<br>Uses Temporal Key Integrity protocol (TKIP) a 128 bit per-packet key and is dynamically generates a new key for each packet<br>WPA-Personal<\/p>\n\n\n\n<p>This version of Wi-Fi encryption implements mandatory elements of 802.11i and introduces CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) a new AES-based encryption mode.<br>Has the optional use of Pairwise Master Key (PMK) caching and opportunistic PMK caching which cache the results of 802.1X authentications to improve access time.<br>WPA-2<\/p>\n\n\n\n<p>Wi-Fi encryption standard that uses a stream cipher RC4 to secure data and a CRC-32 checksum for error checking.<br>Standard versions use a 40 bit key with 24bit IV&#8217;s to form a 64 bit encryption<br>128 bit version uses a 104 bit key with a 24 bit IV<br>Wired Equivalent Privacy (WEP)<\/p>\n\n\n\n<p>Designed for enterprise networks and requires a RADIUS authentication server.<br>Extensible Authentication Protocol (EAP) is used for authentication and has a variety of implementations such as EAP-TLS and EAP-TTLS<br>WPA-Enterprise (WPS-802.1x Mode)<\/p>\n\n\n\n<p>Developed by Netscape and has been supplanted by TLS. Was the preferred method used with HTTPS.<br>SSL (Secure Socket Layer)<\/p>\n\n\n\n<p>This is a encrypting transmission protocol where the client and server perform a negotiation using a handshaking procedure.<br>The client presents the server with a list of encryption and hashing functions it can support.<br>The server picks the strongest encryption and hashing it can also support and notifies the client of the chosen algorithms.<br>The server presents the client with an X.509 Certificate that the client can verify through a CA.<br>The client uses the servers public key with random numbers to generate a session key for a secure connection that is decrypted with the servers private key.<br>This information is used to generate the key material used for encryption and decryption<br>TLS (Transport Layer Security)<\/p>\n\n\n\n<p>A virtual connect that emulates a direct network connection between a user or site to a central location by creating a point-to-point link.<br>Must provide the same level of access and the same level of security.<br>Does not require separate technology, leased lines or direct cabling and piggybacks over existing internet connections.<br>There are four protocols that are used to establish this connection<br>Point-to-Point Tunneling Protocol (PPTP)<br>Layer 2 Tunneling Protocol (L2TP)<br>Internet Protocol Security (IPSec)<br>SSL\/TLS<br>VPN (Virtual Private Network)<\/p>\n\n\n\n<p>Oldest of the three protocols used in VPNs<br>Designed as a secure extension to Point-to-Point Protocol (PPP)<br>Adds the feature of encrypting packets and authenticating users to the older PPP protocol.<br>Works at the data link layer of the OSI model<br>PPTP (Point-to-Point Tunneling Protocol)<\/p>\n\n\n\n<p>Two methods for authenticating users over PPTP<br>One is designed specifically for PPTP and is not proprietary.<br>The second is a three-way process where the client send a code to the server, the server authenticates and responds periodically re-authenticating the remote client even after the connection is established.<br>EAP and CHAP<\/p>\n\n\n\n<p>A PPTP implementation that uses version of DES to encrypt packets. it is useful in many situations but newer version of DES, such as DES3 are preferred.<br>Microsoft Point-to-Point Encryption (MPPE)<\/p>\n\n\n\n<p>Explicitly designed as an enhancement of PPTP<br>Works on the data link layer of the OSI model<br>Authentications methods are<br>CHAP, EAP, PAP, SPAP and MS-CHAP<br>Will work over X.25 (common phone system protocol) networks and over asynchronous transfer mode (ATM) systems.<br>Uses IPSec for encryption<br>Layer 2 Tunneling Protocol (L2TP) VPN<\/p>\n\n\n\n<p>This VPN protocol encrypts not only the packet data but also the header information.<br>Protects against unauthorized retransmission of packets.<br>IPSec (Internet Protocol Security) VPN<\/p>\n\n\n\n<p>Web browser based VPN<br>Gives users access to a target network instead of limited access to secure data such as a bank account.<br>SSL\/TLS VPM<\/p>\n\n\n\n<p>Full drive encryption, can be used with a USB flash drive or preferably, Trusted Platform Module (TPM) to prevent attacks against the computers critical startup process.<br>Uses AEA 128 bit encryption algorithm by default.<br>BitLocker<\/p>\n\n\n\n<p>Software based on-the-fly-encryption.<br>Data is encrypted right before it is saved and decrypted right after it is loaded without user intervention<br>VeraCrypt<\/p>\n\n\n\n<p>Using a standard modulus in RSA (modulus e = 216 + 1 = 65537)<br>Using seeds for symmetric algorithms that are not random enough<br>Hard coded cryptographic secrets\/elements<br>Using too short of keys<br>Re-using keys<br>Unsecure Key Escrow<br>Unsecure cryptographic mode (ECB mode)<br>Proprietary cryptographic algorithms<br>These are all examples of what?<br>Common Cryptography Mistakes<\/p>\n\n\n\n<p>The art and science of writing hidden messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message. A form of security through obscurity.<br>Utilizes the least significant bits in a file in order to store data.<br>Steganography<\/p>\n\n\n\n<p>This is the data to be covertly communicated, The message you wish to hide.<br>Payload<\/p>\n\n\n\n<p>The signal, stream, or data file into which the payload is hidden<br>Carrier<\/p>\n\n\n\n<p>The type of medium used. This may still be photos, video or sound files<br>Channel<\/p>\n\n\n\n<p>The de facto standard for cryptography<br>Non defense or intelligence related organizations are well advised to adopt their standards.<br>They classify cryptography as Suite A Not Published or Suite B Published<br>Classifies algorithms as Type 1, 2, 3, or 4. Type 1 being the highest ranking.<br>National Security Agency (NSA)<\/p>\n\n\n\n<p>Contains classified algorithms that will not be released<br>Algorithms are used to encrypt especially sensitive information<br>NSA Suite A<\/p>\n\n\n\n<p>AES with key sizes of 128 and 256 bits, should be used with GCM mode of operation &#8211; Symmetric encryption.<br>ECDSA &#8211; Digital Signatures<br>ECDH &#8211; Key Agreement<br>SHA 256 AND SHA 384 &#8211; Message Digest<br>Fall under what NSA Suite?<br>NSA Suite B<\/p>\n\n\n\n<p>Highest level of encryption algorithms<br>Used for classified or sensitive U.S. Government information, including cryptographic equipment, assembly or component.<br>certified to encrypt or decrypt classified or sensitive national security information when appropriately keyed<br>Products include:<br>Juniper &#8211; Block Cipher, WALBURN &#8211; High bandwidth link encryption<br>MAYFLY &#8211; Asymmetric , PEGASUS &#8211; Satellite Telemetry<br>FASTHASH &#8211; Hashing<br>NSA Type 1 Algorithms<\/p>\n\n\n\n<p>Used for unclass cryptographic equipment, assemblies or components.<br>Endorsed by the NSA for telecommunications and automated information systems to protect national security information<br>Some algorithms include:<br>SKIPJACK &#8211; Block Cipher<br>KEA (Key Exchange Algorithm) &#8211; Asymmetric<br>NSA Type 2 Algorithms<\/p>\n\n\n\n<p>Is used for sensitive but Uncass (SBU) information on non-national security systems.<br>Some algorithms include:<br>DES, 3DES, SHA, AES<br>NSA Type 3 Algorithms<\/p>\n\n\n\n<p>Algorithms registered by NIST but are not FIPS published.<br>These algorithms are unevaluated commercial cryptographic equipment, assemblies or components that neither the NIST or NSA certify for any Government use.<br>NSA Type 4 Algorithms<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wgu c839 exam oa exam quizletWgu c839 exam oa exam questionsWgu c839 exam oa exam pdfWgu c839 exam oa exam answersWgu c839 exam oa exam answer keyc839 wgu redditpre assessment introduction to cryptographywgu d334 DES64 Bit Block &#8211; 56 Bit Key &#8211; 16 Rounds AES128 Bit Block &#8211; 128, 192, 256 Bit Key &#8211; 10, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[],"tags":[],"class_list":["post-111141","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/111141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=111141"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/111141\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=111141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=111141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=111141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}