Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Cannot deny ownership / origination.






2. Instance when two keys keys generate the same ciphertext from same plaintext






3. Public algorithm - private key.






4. Used with keys; do not need to be encypted; required to prevent defeat of keyspace through pattern analysis






5. Simple substitution - ROT-n - mono-alphabetical.






6. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert






7. 128 bit digest






8. 32 to 448 bit key - Schneier






9. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext






10. Modified md5 - v means "variable"






11. Message Authentication Code - Symmetric enc + Hash






12. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes






13. key storage;escrow;archival;recovery agend;multiple key pairs






14. Mipher added to plaintext to encrypt






15. CIA plus non repudiation






16. Relies on finding weaknesses in the hashing algorithm






17. DES - 3des - aes - idea - two fish - rc4 - blow fish






18. Confidentiality - Authentication - Non-Repudiation






19. One-way - difficult to solve - uses factorization - private key can compute the public key






20. Block based - adds padding - same key - same clear = same ciphertext






21. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.






22. Letters represented by numerical place in the alphabet






23. Encryption - decryption - signing - verifying






24. Set of mathmatical rules used in encryption






25. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






26. Numeric seeding value used to with a symmetric key to provide randomness






27. Block based - Previous block seeds next blocks key






28. Advanced Encryption Standard






29. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks






30. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)






31. Integrity






32. Certificate Authority; registration authority offloads work; validates identity; distributes key; certificate server maintains repository that stores certificates






33. Similar to RSA - very efficient for low end hardware/limited processing power.






34. RSA; El Gamal; ECC; Diffe Hellman; DSA






35. A specific proceedure






36. Process of properly destroying keys at end of userful loife






37. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest






38. One time pad - random key - one use - unbreakable






39. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5






40. Secret; single; conventional; session; shared; private






41. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






42. 256 or 512-bit digest






43. Message hidden within larger context.






44. Large set of possible values used to construct keys






45. Prevent disclosure - privacy






46. Cipher Block Chaining- most common mode of DES loaded sequenctially- XORed using 64 bit initialization vector- first ciphertext XORed with next text block- since IV different;ciphertext different






47. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






48. First public key exchange system - users exchange keys over insecure medium.






49. Science of breakin the code






50. NIST and NSA - 160 bit digest