Term
RSA is a defacto used for 

Definition
1 Encryption
2 Digital signatures
3 Key exchange 


Term
What size is MD5 message digest (hash) 

Definition


Term
What does secure SHA1 creates? 

Definition
1 Fixed length message
2 Digest from a variable length input message 


Term
what encryption do we use in PGP? 

Definition


Term
List IDEA's specifications 

Definition
1 Symmetric
2 64 bit block
3 8 rounds
4 128 bit key
5 Block cipher
6 Used in PGP 


Term
Which is faster, IDEA or DES? 

Definition


Term
List Blowfish's specifications 

Definition
1 Symmetric
2 Block cipher
3 64 bit block
4 Key anywhere between 32 to 448
5 Goes through 16 rounds 


Term
Which layer of OSI model provides non repudiation?


Definition


Term
IS DES symmetric or Asymmetric? 

Definition


Term

Definition
1 Encryption
2 Digital signature 


Term
Diffusion is carried out through... 

Definition


Term
Does RC4 provides hashing? 

Definition


Term
Which algorithm is vulnerable to man in the middle? 

Definition


Term
What is the maximum key size for RC5 algorithm? 

Definition


Term
What are the two types of Cryptography algorithms? 

Definition


Term

Definition
1 Created by Ron Rivest
2 Number of rounds up to 255
3 Symmetric
4 Block Cipher
5 Block size(s): 32,64 128
6 Keys goes up to 2048 bits 


Term
List the "One time Pad" specifications 

Definition
1 Made up of truly random values
2 Used only one time
3 Securly distributed to destination
4 secured at sender's and receive's site
5 At least as long as the message 


Term

Definition
when two keys generate the same cipher text from the same plain text 


Term

Definition
secret sequence of bits and instructions that governs the act of "Encryption" and "Decryption" 


Term
Hint: The only secrecy is the key... 

Definition


Term
The estimate of the effort and resources it would take an attacker to penetrate a cryptosystem? 

Definition


Term
what is cryptosystem made up of? 

Definition
1 Software
2 protocols
3 Algorithms
4 Key 


Term
what do we call the study of cryptography and cryptoanalysis? 

Definition


Term
Rijndale replaced what algorithm? 

Definition


Term
How many rounds does 3DES use? 

Definition


Term
What is the mode that is used when encrypting individual characters are required? 

Definition
Cipher Feed back mode
CFB 


Term
What DES, what mode do we use for ATM and PINS? 

Definition
ECB mode
Electronic Code Book mode 


Term

Definition
 Symmetric
 Block cipher algorithm
 64 bit key
 56 make up the true key



Term
What do we call the practice of breaking cryptic systems? 

Definition


Term
what should we use for 1 secure communication? 

Definition


Term
What algorithm uses Public and Private keys? 

Definition
Asymmetric
which some times is referred to by
Public Key Cryptography 


Term
Confusion is carried out through 

Definition


Term
What is Wasserar agreement? 

Definition
Intangibles can be downloaded from the internet 


Term
What cryptography algorithm provides "Authentication" and "non repudiation"? 

Definition


Term
What we call the DES mode that:
1 Functions like a stream
2 Cipher text is fed back to the algorithm to form a portion of the next input to encrypt the next stream of bit 

Definition


Term
How do we calculate the number of symmetric keys needed ? 

Definition


Term
Is IDEA symmetric or Asymmetric? 

Definition


Term
What is the formula of key Space? 

Definition


Term
What are the two types of Ciphers? 

Definition
Substitution and Transportaion 


Term
What algorithm did Rijndael replaced? 

Definition


Term
In which DES mode does each block of text, the key and the value, are based on previous block processed and applied to the next block? 

Definition
CBC
Cipher Block Chaining 


Term
Give an example about running key cipher? 

Definition
Book number, page number, line number, etc.. 


Term
Give an example about Concealment cipher? 

Definition
Message hidden within a message. For example: Key every 3rd word 


Term

Definition
All possible values that can be sed to generate a key 


Term
When does Frequency analysis take place? 

Definition
when patterns in Ciphertext are identified and matched back to plain text. 


Term
what are the downfalls of symmetric algorithm ? 

Definition
1 Key distribution 2 Scalability 3 Limited security 


Term
Disadvantages of Asymmetric? 

Definition
1 Very slow 2 Size of encrypted limited by key length 


Term
If I encrypt data with my private key, who can decrypt it? 

Definition
any one who has my public key. 


Term
If I encrypt data with your private key, who can decrypt it? 

Definition
That shouldn't happen. Private key should be known by you only. 


Term
If I encrypt data with my public key, who can decrypt it? 

Definition
Only me, because I have the private key 


Term
If I encrypt data with my private key, what service does that provide? 

Definition


Term
why do we use asymmetric keys? 

Definition
To encrypt symmetric keys 


Term
What does DiffieHellman algorithm method allow? 

Definition
It allows key agreement to happen in a secure manner. 


Term
What algorithm replaces DES? 

Definition


Term

Definition
1 Block Cipher 2 Operates on 64 blocks data 3 Key length 128bits 4 Uses 8 rounds of 16 bit sub blocks 


Term

Definition


Term

Definition
1 Variable key size up to 2040 2 Block Cipher 3 Variable Block size 32,64,128 4 Variable rounds up to 255 


Term
When does MAC take place? 

Definition
When message and secret key are put together. 


Term

Definition
Message Authentication Code. 


Term
List the algorithms that can be used for Digital Signatures.. 

Definition


Term

Definition
Digital Signature Standard (DSS) — uses secure hash algorithm (SHA1) and condenses message to 160 bits — Key size 512 to 1024 


Term
If a symmetric key is encrypted with a receiver's public key, what security service is provided? 

Definition


Term
What is the difference between symmetric key and session key? 

Definition
Session key can be used ONE TIME only 


Term

Definition
It is symmetric block encryption algorithm. It uses 64 bit key: 56 make up the true key, and eight bits are used for parity DES goes through 16 rounds of transportation 


Term
How many rounds does 3DES go through? 

Definition
48 rounds. It is Triple DES, means 3xDES 


Term
How many keys does 3DES have? What are they? 

Definition
It has three keys: 1 128goes through 10 rounds....192 bitsgoes through 12 rounds.... and 256 bitsgoes through 14 rounds 


Term
What is Blow fish specs again? 

Definition
64 Bit Block symmetric algorithm It goes through 16 rounds key ranges between 32 up to 448 bits 


Term
Which Symmetric algorithm uses Stream Cipher? 

Definition


Term
A function that take a variable length and creates a fixed length value is called 

Definition


Term
The HAVAL algorithm creates what function? 

Definition


Term
The HAVAL algorithm, performs what function? 

Definition


Term
What does OneWay hash provides? 

Definition


Term
What does MD protect against? 

Definition


Term

Definition
Confidentiality, Integrity, and Authenticity. 


Term
What mail standard relied on Web trust? 

Definition

