Search
Create
Log in
Sign up
Log in
Sign up
security past exam 1
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (25)
Electronic Code Book (ECB) mode of operation is more secure than Cipher Block Chaining (CBC) T or F
False
The operation performed in the vigenere cipher is the character-equivalent of XOR T or F
True
A Linear Congruential Generator is a secure PRNG T or F
False
Frequency analysis alone is sufficient to break a One Time Pad T or F
False
Stream ciphers are resistant to bit-flipping attacks T or F
False
Frequency analysis alone is sufficient to break a vigenere cipher T or F
False
What is the key size for the DES algorithm?
32 bits
56 bits
192 bits
128 bits
256 bits
64 bits
56 bits
A real One Time Pad is perfectly secure?
true
Which of the following algorithms is a malleable cipher
SHA256
AES
MD5
RC4
DES
RC4
What is the primary aspect of security provided by Passwords?
Authenticity
Non-repudiation
Confidentiality
Availability
Integrity
Authenticity
What is the block size for the AES algorithm?
128 bits
64 bits
32 bits
192 bits
56 bits
256 bits
128 bits
A Linear Feedback Shift Register (LFSR) is a secure PRNG?
False
Which block cipher mode of operation effectively turns a block cipher into a stream cipher?
Galois/Counter Mode (GCM)
Output Feedback Mode (OFM)
Cipher Block Chaining (CBC)
Electronic Code Book (ECB)
Output Feedback Mode (OFM)
Merkles Puzzles provide an efficient mechanism for key exchange.?
false
What is the general aim of security?
To protect information
To stop attackers at all cost
To build reliable systems
To increase the cost of breaking a system
To increase the cost of breaking a system
What is the primary aspect of security provided by HMACs?
Confidentiality
Integrity
Covertness
Non-repudiation
Availability
Integrity
The key to a Feistel network's operation is that the round functions must be invertible?
False
Which of the following provides diffusion in the AES algorithm?
Shift Rows
Substitution Box
SP-Network
XOR Round Key
Expander Function
Initial Permutation (IP)
shift rows
Frequency analysis alone is sufficient to break a basic substitution cipher?
True
Birthday attacks are easier to perform than attacks on pre-image resistance?
True
What is the primary aspect of security provided by Encryption?
Authenticity
Availability
Confidentiality
Non-repudiation
Integrity
Confidentiality
What modifications did the NSA make to IBM's Lucifer, before it was announced as DES?
Increased Key Size
Improved Key Scheduling Algorithm
Modified S-Box
Modified P-Box
Modified S-Box
How many rounds does DES have in it's Feistel network?
12
16
32
64
16
Identify and briefly explain three cryptanalysis attacks other than RHA
Ciphertext only attack (COA) - Attacker only has access to the ciphertext
Known Plaintext Attack (KPA) - Attacker intercepts a random plaintext / ciphertext pair: (m, c)
Chosen Plaintext Attack (CPA) - Attacker selects a message m and receives the ciphertext c
Chosen Ciphertext Attack (CCA) - Attacker specifies a ciphertext c and receives the plaintext m
A global deduction is a more powerful break than local deduction?
true
;