Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Rivest-Shamir-Adleman - factorization - used for encryption - key exchange and digital signature.






2. Asymmetric enc + Hash - validity of message - non repudiation






3. Numeric seeding value used to with a symmetric key to provide randomness






4. Eliptical Curve Cryptography; encryption; dig signatures and key exchange;highest strength per bit of key length; most efficient;160 bit el gamal= 1024 RSA-used in wireless devices use






5. Instance when two keys keys generate the same ciphertext from same plaintext






6. Caesar cipher - scytale - Blaise de vigenere - vernam cipher






7. Cipher Feedback Emulates stream cipher data encrypted in smaller units than block size; plaintext pattersn concealed in XOR; previous ciphertext block is encrypted and output produced is conbined with plaintext block using XOR-to produce next ciphert






8. NIST and NSA - 160 bit digest






9. Hardware - software - and policies (security association) -






10. Each pair of entities must receive in secure fashion; requires more overhead than worth; key distro challenging- sender recievermust be on the same sheet






11. Centralized key mgt key issuer; keeps copy of keys or decentralized key mgt; end user generates keys and submits to CA;does not provide for key escrow; no recovery possible






12. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits






13. 64 bit blocks of data; variable key lengths






14. Science of breakin the code






15. RSA






16. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)






17. Rearrances the bits characters or character blocks






18. Data Encryption Standard - 64 bit blocks - 56 bit key - 16 rounds - 4 modes






19. Pro's: key management cons: speed/file size






20. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext






21. Stream based - also uses prior cypher text to seed






22. Spartans - wrapped around rod.






23. Authentication and integrity - needed when... At rest and in transit.






24. One key - only confidentiality






25. Secret; single; conventional; session; shared; private






26. key storage;escrow;archival;recovery agend;multiple key pairs






27. Science of protecting information by encoding it






28. Based on probability with 23 people 50% chance 2 will have same birthday






29. Link Encryption and end to end encryption






30. Online Certificate Status Protocol- used to query the CA; useful in large; complex environments; responds to a query with status of valid; suspended; or revoked






31. Has authority to remove keys from escrow;






32. Encryption - decryption - signing - verifying






33. Looks for patterns in ciphertext to discover the key.






34. Function that takes a variable length string; and compresses and transforms it into a fixed length- output called a hash or message digest






35. When a hash fuunction generates same output for same input






36. Large set of possible values used to construct keys






37. Provided by mixing key values during repeated rounds of encryption






38. Process of properly destroying keys at end of userful loife






39. International Data Encryption Algorithm- operateson 64 bit blocks-uses 128 bit key and is faster than DES; used in PGP and other software; no successful attacks






40. 32 to 448 bit key - Schneier






41. Authenticity - integrity - digital signatures - storing passwords.






42. Provided by mixing up the location of plaintext throughout the cipher






43. Rearranges bits or bytes






44. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5






45. Block based - Previous block seeds next blocks key






46. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






47. Setting policies; protecting keys; key recovery; responding to key compromise; keys long enough to prevent attack; cryptoperiod: key lifetimes






48. Message Authentication Code - Symmetric enc + Hash






49. Set symbol size usually 64 bits






50. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t