A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed
Type 1
https://en.wikipedia.org/wiki/NSA_cryptography#Type_1_Product
A Type 1 Product refers to an NSA endorsed classified or controlled cryptographic item for classified or sensitive U.S. government information, including cryptographic equipment, assembly or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed.
Incorrect answers:
Type 2 - product refers to an NSA endorsed unclassified cryptographic equipment, assemblies or components for sensitive but unclassified U.S. government information.
Type 3 - unclassified cryptographic equipment, assembly, or component used, when appropriately keyed, for encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices. A Type 3 Algorithm refers to NIST endorsed algorithms, registered and FIPS published, for sensitive but unclassified U.S. government and commercial information.
Type 4 - Algorithm refers to algorithms that are registered by the NIST but are not FIPS published. Unevaluated commercial cryptographic equipment, assemblies, or components that are neither NSA nor NIST certified for any Government usage.
John is going to use RSA to encrypt a message to Joan. What key should he use?
Joan's public key
https://en.wikipedia.org/wiki/RSA_(cryptosystem)
Suppose Joahn uses Bob's public key to send him an encrypted message. In the message, she can claim to be Alice but Bob has no way of verifying that the message was actually from Alice since anyone can use Bob's public key to send him encrypted messages. In order to verify the origin of a message, RSA can also be used to sign a message.
Suppose Alice wishes to send a signed message to Bob. She can use her own private key to do so. She produces a hash value of the message, raises it to the power of d (modulo n) (as she does when decrypting a message), and attaches it as a 'signature' to the message. When Bob receives the signed message, he uses the same hash algorithm in conjunction with Alice's public key. He raises the signature to the power of e (modulo n) (as he does when encrypting a message), and compares the resulting hash value with the message's actual hash value. If the two agree, he knows that the author of the message was in possession of Alice's private key, and that the message has not been tampered with since.
A _____ is a function that takes a variable-size input m and returns a fixed-size string.
Hash
https://en.wikipedia.org/wiki/Hash_function
A hash function is any function that can be used to map data of arbitrary size to fixed-size values.
Part of understanding cryptography is understanding the cryptographic primitives that go into any crypto system. A(n) _______ is a fixed-size input to a cryptographic primitive that is random or pseudorandom.
Key
https://en.wikipedia.org/wiki/Key_(cryptography)
In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm. For encryption algorithms, a key specifies the transformation of plaintext into ciphertext, and vice versa for decryption algorithms. Keys also specify transformations in other cryptographic algorithms, such as digital signature schemes and message authentication codes.
Bruce Schneier is a well-known and highly respected cryptographer. He has developed several pseudo random number generators as well as worked on teams developing symmetric ciphers. Which one of the following is a symmetric block cipher designed in 1993 by Bruce Schneier team that is unpatented?
Blowfish
https://en.wikipedia.org/wiki/Blowfish_(cipher)
Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in many cipher suites and encryption products.
Nada
14 hours agoVilma
10 days agoOcie
17 days agoCathern
24 days agoDarci
1 month agoXenia
1 month agoRosita
2 months agoEarnestine
2 months agoMartina
2 months agoMargurite
2 months agoErick
3 months agoLynelle
3 months agoTricia
3 months agoKanisha
3 months agoKanisha
3 months agoSue
4 months agoYen
4 months agoRodolfo
4 months agoNieves
5 months agoIrma
5 months agoRodrigo
5 months agoAvery
5 months agoAlishia
5 months agoZachary
6 months agoStevie
6 months agoLai
8 months agoGladis
9 months agoRonna
10 months agoKaycee
11 months agoBarabara
1 year agoErasmo
1 year agoDemetra
1 year agoLuz
1 year agoNovella
1 year agoAdelina
1 year agoMaia
1 year agoCorrie
1 year agoAntione
1 year agoElke
1 year agoBrandon
1 year agoReuben
1 year agoLatrice
1 year agoBuffy
1 year agoBernardine
1 year agoNydia
1 year agoTamra
2 years agoGracia
2 years agoTanja
2 years agoGearldine
2 years agoBarney
2 years agoRory
2 years agoBerry
2 years agoArminda
2 years agoHenriette
2 years agoAlverta
2 years agoLindsey
2 years ago