Ch. 7 Flashcards
(10 cards)
If Richard wants to send an encrypted message to Sue using a public key crypto system, which key does he use the encrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
C. Sue’s public key
If a 2048-bit plaintext message were encrypted with the El Gamal public key crypto system, how long would the resulting cipher-text message be?
A. 1024 bits
B. 2048 bits
C. 4096 bits
D. 8192 bits
C. 4096 bits
Acme widgets currently uses a 1024-bit RSA encryption standard company wide. The company plans to convert from RSA to an elliptic curve crypto-system. If he wants to maintain the same cryptographic strength, what ECC key length should he use?
A. 160 bits
B. 512 bits
C. 1024 bits
D. 2048 bits
A. 160 bits
Richard received an encrypted message sent to him from Sue. Which key should he use to decrypt the message?
A. Richard’s public key
B. Richard’s private key
C. Sue’s public key
D. Sue’s private key
B. Richard’s private key
- Acme Widgets currently uses a 1,024-bit RSA encryption standard companywide. The company plans to convert from RSA to an elliptic curve cryptosystem. If it wants to maintain the same cryptographic strength, what ECC key length should it use?
A. 160 bits
B. 512 bits
C. 1,024 bits
D. 2,048 bits
Answer: A
The elliptic curve cryptosystem requires significantly shorter keys to achieve encryption that would be the same strength as encryption achieved with the RSA encryption algorithm. A 1,024-bit RSA key is cryptographically equivalent to a 160-bit elliptic curve cryptosystem key.
Your organization has recently signed a contract with a governmental agency. The contract requires that you implement the X.509 standard. What does this standard govern? IKE IPSec HTTP PKI
D. PKI
Which factor does NOT affect the relative strength of a cryptosystem? A. The key exchange value B. The encryption algorithm C. The secret key length D. The secret key secrecy
A. The key exchange value
What is an example of a brute force attack?
A. Sending multiple ICMP messages to a Web server
B. Searching through a company’s trash
C. Using a program to guess passwords from a SAM file
D. Gathering packets from a network connection
C. Using a program to guess passwords from a SAM file
You have been specifically asked to implement a stream cipher. Which cryptographic algorithm could you use? A. RC4 B. RC5 C. RC6 D. MD5
A. RC4
What is an algorithm that is used to create a message digest for a file to ensure integrity? A. Plaintext B. Hash C. Ciphertext D. Public Key
B. Hash