0 of 20 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 20 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Maximum size message or block to be encrypted = public modulus minus ___ bytes
When using the RSA algorithm, the plaintext size cannot be larger than the modulus of the key. Maximum size message or block to be encrypted = public modulus minus bytes.
Fill in the blank.
bits RSA certificates are obsolete and not accepted by browsers.
As of 2020, RSA keys should be bits. This is not predicted to be cracked until .
For security beyond that year, -bit RSA keys are recommended. For their extended validation services, some CAs require at least -bit keys.
While it’s an oddball size, -bit keys are available and widely supported. All major CAs can now issue certificates for this requirement.
A(n) _______ key exchange means that we’re not sending the key over the network.
A(n) key exchange means that we’re not sending the key over the network.
Fill in the blank.
Elliptic curve cryptography is not presently vulnerable to computing because there are no quantum computers big and reliable enough to matter.
Secure enclaves use ________ encryption because of bigger block size and different key lengths available.
Secure enclaves use encryption because of bigger block size and different key lengths available.
Fill in the blank.
cryptography (PQC), sometimes referred to as quantum-proof, quantum-safe, or quantum-resistant, is the development of cryptographic algorithms
(usually public-key algorithms) that are currently thought to be secure against a cryptanalytic attack by a quantum computer.
Select all statements that are true regarding symmetric encryption: (select all that apply)
Fill in the blank.
When determining which encryption algorithms to use for the IKE policy or IPsec proposal, your choice is to algorithms supported by the devices in the VPN.
_________ mode encrypts group of bits at a time
mode encrypts group of bits at a time
Select the correction option for AES-128 rounds:
_____ encryption is a fundamental technique used in various cryptographic algorithms to secure data. It combines plaintext with a secret key using the XOR (exclusive OR) operation, resulting in encrypted data that can only be decrypted using the same key.
encryption is a fundamental technique used in various cryptographic algorithms to secure data. It combines plaintext with a secret key using this operation, resulting in encrypted data that can only be decrypted using the same key.
Fill in the block cipher mode and description.
BLOCK CIPHER MODES | ||
---|---|---|
Abbr. | Mode | Characteristics |
Each block that we’re going to encrypt is going to be encrypted with exactly the same key | ||
A popular mode of operation that’s relatively easy to implement;Achieve randomization by XORing plain text block with the previous ciphertext block | ||
A block cipher mode that acts like a stream cipher;uses an arbitrary number that changes with each block of text encrypted | ||
Able to provide both encryption and authentication at the same time with a minimum amount of latency and a minimum operational overhead |
Which of these are symmetric Algorithms? (Select all that apply)
Which of these are asymmetric algorithms? (Select all that apply)
Select all of the stream ciphers.
Select all of the hashing algorithms.
Match the symmetric algorithm with its corresponding description.
standard of the United States federal government.
Used in WPA2
|
|
Uses 3 keys ; Encrypt with key 1;decrypt with key 2; encrypt key 3
|
|
Deprecated FIPS standard due to its small key size making it easy to brute force
|
|
First algorithm not limited by patents; no known way to break the full 16 rounds of encryption
|
|
Part of original WEP standard and SSL, it was deprecated based on algorithm creating biased output
|
|
Another algorithm not limited by patents; encrypts 128 bits of data at a time
|
|
Match the algorithm with its corresponding property
DSA which uses keys derived from elliptic curve cryptography (ECC)
|
|
GPG (Gnu Privacy Guard) software was created from the PGP standard
|
|
A key exchange using a mathematical method of securely generating a symmetric cryptographic key over a public channel
|
|
Commercially available security program that enables users to communicate securely by decrypting and encrypting messages, authenticating messages through digital signatures, and encrypting files
|
|
First practical use of public-key cryptography
|
|
Leverages the mathematical theory of elliptic curves to achieve the same level of security with considerably smaller keys.
|
|
used to ensure the validity and integrity of a messages, software, or digital document
|
|
Fill in the blanks
Algorithm | Output Size (bits) | Block Size (bits) | Rounds |
---|---|---|---|
MD5 | |||
SHA-1 | |||
SHA-256 | |||
SHA-512 | |||
SHA3-256 |
Fill in the symmetric block and key sizes
Algorithm | Block Size (bits) | Key Size (bits) |
---|---|---|
Data Encryption Standard | ||
3DES | ||
Rivest Cipher 4 | Not Applicable | – |
Advanced Encryption Standard | , , | |
Blowfish | Variable: to | |
Twofish | Variable: 1 to |