Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Prove knowledge of a fact to a third party without revealing the fact itself






2. Carlisle Adams and Stafford Tavares; CAST 128 64 bit block cipher-uses keys between 48 and 128 bit lengths 12 to 16 rounds of operations CAST 256 uses 48 rounds; of 128; 192; 160; 224; 256






3. Stream based - errors do not propagate across blocks






4. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks






5. Has authority to remove keys from escrow;






6. variable block and key sizes 128; 192; 256; uses a variable number of rounds; has low memory requirements; easy to defend against timing attacks; implemented in software; hardware is costly.






7. Rearranges bits or bytes






8. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"






9. Mipher added to plaintext to encrypt






10. Cannot deny ownership / origination.






11. First public key algorithm; not used for message encrypt or digital signatures; uses large prime numbers; requires both sender and reciever to have key pairs; vulnerable to man in the middle attacks






12. Block based - adds padding - same key - same clear = same ciphertext






13. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet






14. Keys needed to decrypt cyphertext so an authorized third party can gain access






15. Numeric seeding value used to with a symmetric key to provide randomness






16. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)






17. 128 bit digest






18. MD5 - SHA1






19. Symmetric for Bulk Encrypt; assym for key encapsulation- used in SSL; Email; key exchange






20. Measar cipher






21. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers






22. Digital signature standard; performs integrity by SHA; uses DSA; RSA;Elyp CurveDSA






23. 128 bit encryption; on 16 rounds of encryption; key size of 64 bits 8 parity; 56 bits long






24. CIA plus non repudiation






25. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes






26. Study of both cryptography and cryptanalysis






27. Broken






28. Looks for patterns in ciphertext to discover the key.






29. Encryption - decryption - signing - verifying






30. NIST 1991 - outlines authorized algorithms






31. Pro's: key management cons: speed/file size






32. When a hash fuunction generates same output for same input






33. Secret; single; conventional; session; shared; private






34. Buries a message by taking the least significant bit of evvery byte to carry the message; hide a message in another message. Graphics; sound files; alternated used in corporate espionage






35. Message Authentication Code - Symmetric enc + Hash






36. key storage;escrow;archival;recovery agend;multiple key pairs






37. Advanced Encryption Standard






38. Integrity Check Value-makes the hash with the hash algorithm






39. OCSP; OSPF- routing protocol; Online Vulnerability Assessment Language; Orthogonal Frequency Division Multiplexing


40. Set symbol size usually 64 bits






41. Message hidden within larger context.






42. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder






43. Hides data in images - usually by LSB (least significant bit)






44. NIST and NSA - 160 bit digest






45. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






46. Process of properly destroying keys at end of userful loife






47. Block based - Previous block seeds next blocks key






48. Integrity






49. Uses Lucas functions.






50. Based on diffie-hellman - encryption - digital signatures and key exchange.