A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Hash
https://en.wikipedia.org/wiki/Hash_function
A hash function is any function that can be used to map data of arbitrary size to fixed-size values.
Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.
Key
https://en.wikipedia.org/wiki/Key_(cryptography)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption algorithms, a key specifies the transformation of plaintext into ciphertext, and vice versa for decryption algorithms. Keys also specify transformations in other cryptographic algorithms, such as digital signature schemes and message authentication codes.
Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?
Blowfish
https://en.wikipedia.org/wiki/Blowfish_(cipher)
Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products.
Which of the following uses an 80 bit key on 64 bit blocks?
Skipjack
https://en.wikipedia.org/wiki/Skipjack_(cipher)
Skipjack uses an 80-bit key to encrypt or decrypt 64-bit data blocks. It is an unbalanced Feistel network with 32 rounds.
Incorrect answers:
Twofish - is a symmetric key block cipher with a block size of 128 bits and key sizes up to 256 bits. It was one of the five finalists of the Advanced Encryption Standard contest, but it was not selected for standardization. Twofish is related to the earlier block cipher Blowfish.
AES - For AES, NIST selected three members of the Rijndael family, each with a block size of 128 bits, but three different key lengths: 128, 192 and 256 bits.
DES - Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for applications, it has been highly influential in the advancement of cryptography.
John is responsible for VPNs at his company. He is using IPSec because it has two different modes. He can choose the mode appropriate for a given situation. What are the two modes of IPSec? (Choose two)
Correct answers: Transport mode and Tunnel mode
https://en.wikipedia.org/wiki/IPsec#Modes_of_operation
The IPsec protocols AH and ESP can be implemented in a host-to-host transport mode, as well as in a network tunneling mode.
Sue
5 days agoYen
13 days agoRodolfo
20 days agoNieves
27 days agoIrma
1 months agoRodrigo
1 months agoAvery
2 months agoAlishia
2 months agoZachary
2 months agoStevie
2 months agoLai
4 months agoGladis
5 months agoRonna
7 months agoKaycee
8 months agoBarabara
9 months agoErasmo
10 months agoDemetra
10 months agoLuz
11 months agoNovella
11 months agoAdelina
11 months agoMaia
11 months agoCorrie
12 months agoAntione
1 years agoElke
1 years agoBrandon
1 years agoReuben
1 years agoLatrice
1 years agoBuffy
1 years agoBernardine
1 years agoNydia
1 years agoTamra
1 years agoGracia
1 years agoTanja
1 years agoGearldine
1 years agoBarney
1 years agoRory
1 years agoBerry
1 years agoArminda
1 years agoHenriette
1 years agoAlverta
1 years agoLindsey
2 years ago