Which of the following are valid key sizes for AES (Choose three)?
A. 192
B. 56
C. 256
D. 128
E. 512
F. 64
A non-secret binary vector used as the initializing input algorithm for encryption of a plaintext block sequence to increase security by introducing additional cryptographic variance.
A. IV
B. Salt
C. L2TP
D. Nonce
You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key. The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?
A. The key expansion phase
B. The round key phase
C. The bit shifting phase
D. The initial round
This hash function uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged.
A. SHA-256
B. FORK-256
C. SHA-1
D. RSA
Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
A. Vigenere's principle
B. Shamir's principle
C. Kerkchoff's principle
D. Babbage's principle
The greatest weakness with symmetric algorithms is _____.
A. They are less secure than asymmetric
B. The problem of key exchange
C. The problem of generating keys
D. They are slower than asymmetric
In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?
A. IPSec does not involve gateways
B. Only transport mode can be used
C. Encapsulating Security Payload (ESP) authentication must be used
D. Only the tunnel mode can be used
A cipher is defined as what
A. The algorithm(s) needed to encrypt and decrypt a message
B. Encrypted text
C. The key used to encrypt a message
D. Any algorithm used in cryptography
The time and effort required to break a security measure.
A. Session Key
B. Work factor
C. Non-repudiation
D. Payload