Answer: B
Hint: The correct answer is B. Answer A refers to DES, a symmetric encryption algorithm ; answer C is a distracter - there is no such term; answer D is the Advanced Encryption Standard, Which has replaced DES and is now the Rijndael algorithm.
Answer: A
Hint: The correct answer is A by definition. Answer B is incorrect because SSL/TLS operates above the Transport Layer; answer C is incorrect because authentication and integrity are provided also, and answer D is incorrect because it cites only confidentiality and SSL/TLS operates above the Transport Layer.
Answer: C
Hint: The correct answer is C. Answer A and B are incorrect because they are general types of encryption systems, and answer D is incorrect because hashing algorithms are not digital certificates.
Answer: A
Hint: The correct answer is A, Modular exponentiation in elliptic curves is the analog of the modular discreet logarithm problem. Answer B is incorrect because prime factors are involved with RSA public key systems: answer C is incorrect because modular addition in elliptic curves is the analog of modular multiplication; and answer D is incorrect because the knapsack problem is not an elliptic curve problem.
Answer: C
Hint: The correct answer is C. Answers A, B, and D are other symmetric key algorithms
Answer: B
Answer: D
Hint: The correct answer is D. SSL performs security functions in TCP/IP. The other answers refer to protocols in the WAP protocol stack also, but their primary functions are not security.
Answer: B
Hint: The correct answer is B. The SPI, AH and/or ESP and the destination IP address are components of an IPSec Security Association (SA). The other answers describe protocols other than IPSec.
Answer: C
Hint: The correct answer is C. Answer A describes a type of cryptographic system using a public and a private key; answer B is the art/science of breaking ciphers; answer D is the conversion of a message of variable length into a fixed-length message digest.
Answer: B
Hint: The correct answer is A. An XOR operation results in a 0 if the two input bits are identical and a 1 if one of the bits is a 1 and the others is a 0.
Answer: D
Hint: The correct answer is D. Answer A describes a stream cipher; answer B is incorrect because a block cipher applies to symmetric key algorithms: and answer C describes a hashing operation.
Answer: A
Hint: The correct answer is A. Answer B is incorrect because private key cryptography does not create digital signatures: answer C is incorrect because DES is a private key system and,therefore, follows the same logic as in B; and answer D is incorrect because digital signatures are implemented to obtain authentication and integrity.
Answer: A
Hint: The correct answer is A. The other answers are examples of asymmetric key systems.
Answer: B
Hint: The correct answer is D. Answer A is incorrect because the opposite is true; answer B is incorrect because most symmetric key algorithms are published; and answer C is in correct because work factor is a function of the key size, The larger the key is, the larger the work factor.
Answer: D
Hint: The correct answer is D. All the other answers refer to symmetric key algorithms.
Answer: D
Hint: The correct answer is D. Answers A and B are incorrect because if one key encrypts, the other can decrypt. Answer C is incorrect because if the public key encrypts, it cannot decrypt.
Answer: B
Hint: The correct answer is B. Answer A is incorrect because public key cryptography is usually used for the encryption and transmission of the secret session key. Answer C is incorrect because both public and private key encryption are used, and answer D is incorrect because digital certificates can be used (and normally are used).
Answer: C
Hint: The correct answer is C. The other answers with fixed numbers are incorrect.
Answer: B
Hint: The correct answer is B. Answer A is incorrect because a one-time pad uses a random key with a length equal to the plaintext message and is used only once. Answer C is the process of sending a message with no indication that a message even exists. Answer D is incorrect because it applies to stream ciphers that are XORed with a random key string.
Answer: B
Hint: The correct answer is B. It uses one alphabet shifted three places. Answers A and C are incorrect because in answer A, multiple alphabets are used, and in answer C, the letters of the message are transposed. Answer D is incorrect because code groups deal with words and phrases and ciphers deal with bits or letters.
Answer: D
Hint: The correct answer is D. The other answers are incorrect because neither algorithm is used.
Answer: C
Answer: B
Hint: The correct answer is B. Answer A defines confussion; Answer C defines how confusion is accomplished; and Answer D is incorrect because it can be accomplished.
Answer: B
Hint: The correct answer is B. By definition , the others are incorrect.
Answer: C
Hint: The correct answer is C. There is no such encipherment mode.
Answer: C
Hint: The correct answer is C. The Meet-in-the-Middle attack has been successfully applied to double DES, and the work factor is equivalent to that of single DES, Thus, answer D is incorrect. Answer A is false because the work factor of triple DES is greater than that for double DES. In triple DES, three levels of encryption and/or decryption are applied to the message. The work factor of double DES is equivalent to the work factor of single DES. Answer B is false because the work factor of single DES is less than for triple DES.
Answer: D
Hint: The correct answer is D. This answer is a distracter and does not exist.
Answer: B
Answer: B
Hint: In digital computers, a bit is in either a one or zero state. In a quantum computer, through linear superposition, a quqntum bit can be in both states, essentially simultaneously. Thus, computations consisting of trail evaluations of binary patterns can take place simultaneously in exponential time. The probability of obtaining a correct result is increased through a phenomenon called constructive interference of light, while the probability of obtaining an incorrect result is decreased through destructive interference. Answer A describes optical computing that is effective in applying Fourier and other transformations to data to perform high-speed computations. Light representing large volumes of data passing through properly shaped physical objects can be subjected to mathematical transformations and recombined to provide the appropriate results. However, this mode of computation is not defined as quantum computing. Answer C and D are diversionary answers that do not describe quantum computing.
Answer: C
Hint: The correct answer is C. If the one-time-pad is used only once and its corresponding key is truly random and does not have repeating characters, it is unbreakable. Answer A is incorrect because if used properly, the one-time-pad should be used only once. Answer B is incorrect because the key should be random. Answer D is incorrect because the key has to be of the same length as the message.
Answer: C
Answer: A
Hint: The correct answer is A. The hash function generates a message digest. The message digest is encrypted with the private key of the sender. Thus. if the message can be opened with the sender's public key that is known to all, the message must have come from the sender. The message is not encrypted with the public key because the message is usually longer than the message digest and would take more computing resources to encrypt and decrypt. Because the message digest uniquely characterizes the message, it can be used to verify the identity of the sender. Answers B and D willnot work because a message encrypted in the public key of the sender can be read only by using the private key of the sender. Because the sender is the only one who knows this key, no one else can read the message. Answer C is incorrect because the message is not encrypted; the message digest is encrypted.
Answer: D
Hint: The correct answer is D. Answer a applies to public key algorithm such as Diffe-Hellman and Elliptic Curve. Answer B is incorrect because it is easy to multiply two large prime numbers. Answer C refers to symmetric key encryption
Answer: A
Hint: The correct answer is A. It is more difficult to compute curve discreet logarithms than conventional discreet logarithms or factoring. Smaller key sizes in the elliptic curve implementation can yield higher levels of security. Therefore, answer B is incorrect. Answer C and D are incorrect because elliptic curve cryptosystems can be used for digital signatures and encryption.
Answer: D
Hint: IBE is based on using an arbitrary string as an individual's public key. It is based on public key cryptography; therefore, a symmetric key is not involved in the process.