The reverse process from encoding - converting the encoded message back into its plaintext format.
A. Substitution
B. Whitening
C. Encoding
D. Decoding
The Clipper chip is notable in the history of cryptography for many reasons. First, it was designed for civilian used secure phones. Secondly, it was designed to use a very specific symmetric cipher. Which one of the following was originally designed to provide built-in cryptography for the Clipper chip?
A. Blowfish
B. Twofish
C. Skipjack
D. Serpent
A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into the public key standard IEEE P1363.
A. Blum Blum Shub
B. Elliptic Curve
C. Menezes-Qu-Vanstone
D. Euler's totient
A cryptanalysis success where the attacker deduces the secret key.
A. Information Deduction
B. Avalanche effect
C. Shannon's Entropy
D. Total Break
Which of the following is not a key size used by AES?
A. 128 bits
B. 192 bits
C. 256 bits
D. 512 b
Which one of the following is an example of a symmetric key algorithm?
A. ECC
B. Diffie-Hellman
C. RSA
D. Rijndael
Which of the following encryption algorithms relies on the inability to factor large prime numbers?
A. RSA
B. MQV
C. EC
D. AES
In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the following is true?
A. IPSec does not involve gateways
B. Only transport mode can be used
C. Encapsulating Security Payload (ESP) authentication must be used
D. Only the tunnel mode can be used
John is going to use RSA to encrypt a message to Joan. What key should he use?
A. A random key
B. Joan's public key
C. A shared key
D. Joan's private key
A _______ product refers to an NSA-endorsed classified or controlled cryptographic item for classified or sensitive U. S. government information, including cryptographic equipment, assembly, or component classified or certified by NSA for encrypting and decrypting classified and sensitive national security information when appropriately keyed
A. 1
B. 4
C. 2
D. 3