What is the basis for the FISH algorithm?
A. The Lagged Fibonacci generator
B. Prime number theory
C. Equations that describe an ellipse
D. The difficulty in factoring numbers
A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.
A. Total Break
B. Distinguishing Algorithm
C. Instance Deduction
D. Information Deduction
_____ uses at least two different shifts, changing the shift with different letters in the plain text.
A. Caesar cipher
B. multi-alphabet encryption
C. Scytale
D. Atbash
Which of the following Secure Hashing Algorithm (SHA) produces a 160-bit digest from a message with a maximum length of (264-1) bits and resembles the MD5 algorithm?
A. SHA-0
B. SHA-2
C. SHA-1
D. SHA-3
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non- Feistel ciphers use these s-boxes. What is an s-box?
A. A substitution box where input bits are replaced
B. A black box for the algorithm implementation
C. A shifting box where input bits are shifted
D. Another name for the round function
Which one of the following is a symmetric key system using 64-bit blocks?
A. DES
B. PGP
C. DSA
D. RSA
Which of the following was a multi alphabet cipher widely used from the 16th century to the early 20th century?
A. Atbash
B. Caesar
C. Scytale
D. Vigenere
Terrance oversees the key escrow server for his company. All employees use asymmetric cryptography to encrypt all emails. How many keys are needed for asymmetric cryptography?
A. 2
B. 4
C. 3
D. 1
If Bob is using asymmetric cryptography and wants to send a message to Alice so that only she can decrypt it, what key should he use to encrypt the message?
A. Alice's private key
B. Bob's private key
C. Alice's public key
D. Bob's public key
How can rainbow tables be defeated?
A. Lockout accounts under brute force password cracking attempts
B. All uppercase character passwords
C. Use of non-dictionary words
D. Password salting