Test your basic knowledge |

CISSP Crypto Domain

Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Different keys for encryption and decryption; two keys private and public Encrypt with private- unencrypt with privateor encrypt with public- decrypt with private. Use of private ensures non repudiation; without confidentiality-becomes the digital si






2. characters are substituted or shifted






3. Authenticity - integrity - digital signatures - storing passwords.






4. Rives Shamir; adleman- based on factoring of large prime numbers-encrypt-dig sig- and key exchange variable key length 512 to 4096- strong but slow; 100 times slower than software; 1000-10000 slower than hardware encryption






5. Set symbol size usually 64 bits






6. Rearranges bits or bytes






7. Science of protecting information by encoding it






8. Confidentiality - Authentication - Non-Repudiation






9. Provided by mixing up the location of plaintext throughout the cipher






10. RC(x) - 32 - 64 - 128 bit blocks - key max at 2048 bits






11. Easily transportable;cannot be initiated by something else; can be automatically time stamped;provides integrity by encrypting hash value;hash value generated with senders private key






12. Integrity Check Value-makes the hash with the hash algorithm






13. Integrity






14. Public Key Infrastructure- Developed to provide standards for key generation; authentication; x.509 non used with Pretty Good Privacy; good private good "web of trust"






15. Polyalphabetic - substitution - 2d grid of alphabet






16. Mipher added to plaintext to encrypt






17. Mathematical operation performed several times on the same message block






18. Upgrade to DES; Replaced by AES; takes three times longer to encrypt






19. Data in readable format- red side






20. Stream cipher; stream algorithm works one bit at a time usually done in Hardware; no memory required; very fast; block cipher; works on blocks of bits; transforms into fixed length blocks; encrypted block by block 64; 128; 256 uses substitution and t






21. Secret; single; conventional; session; shared; private






22. Broken






23. Rearrances the bits characters or character blocks






24. Caesar cipher - scytale - Blaise de vigenere - vernam cipher






25. Block based - adds padding - same key - same clear = same ciphertext






26. Advanced Encryption Standard - replaced DES - Rijndael based - 128 - 192 - and 256 bit keys/blocks with 10 - 12 - 14 rounds resp.






27. Estimated time resources to break a cryptosystem






28. Both parties have same key(kept secret) exchage keys before comms begins; faster than asymmetric crypto; best suited for bulk encryption; N(N-1)/2 is the number of keys needed; File Encryption Key (FEK)






29. 128 bit digest






30. RSA; El Gamal; ECC; Diffe Hellman; DSA






31. Attmpts to conceal data by hiding it; Used by placing information in objectssuch as graphics; sound files or document headers






32. Binary operation that adds bits together; plaintext is XORed with a random keystream to generate cyphertext






33. Similar to RSA - very efficient for low end hardware/limited processing power.






34. Pro's: key management cons: speed/file size






35. Keyword: integrity






36. Credentials that allow verification; contains serial no; ident info; dig signature;lifetime dates;public key of the cert holder






37. Hardware - software - and policies (security association) -






38. Scrambled version of the alphabet






39. Data Encryption Standard (DES) 5 Block Modes; Trple DES runs through it three times; Blowfish; IDEA; RC4; RC5






40. Spartans - wrapped around rod.






41. Hash Mess Auth Code (512bit MD5; SHA-1); calculated using a hash function with secret key- shared key appended to data shared faster than DES CBC- used in IPSEC SSL/TLS and SSH






42. Operates on bits - higher speed - usually implemented in hardware.






43. Single authority trust; heirarchal trust; web of trust; hybrid cross certificationusesd in businesses to trust each others CA's; and DISA Model Root; intermediate; leaf at the local levels






44. Provided by mixing key values during repeated rounds of encryption






45. 48 rounds - 2 or 3 keys - enc enc enc (EEE) - or enc dec enc (EDE)






46. Stream based - also uses prior cypher text to seed






47. Cipher Block Chaining- most common mode of DES loaded sequenctially- XORed using 64 bit initialization vector- first ciphertext XORed with next text block- since IV different;ciphertext different






48. Prevent disclosure - privacy






49. CIA plus non repudiation






50. NIST 1991 - outlines authorized algorithms