Advanced Cryptography Textbook Exam Questions - 842 Verified Questions

Page 1


Advanced Cryptography

Textbook Exam Questions

Course Introduction

Advanced Cryptography delves into the design, analysis, and practical deployment of modern cryptographic systems. Building on foundational cryptography concepts, this course covers advanced topics such as zero-knowledge proofs, cryptographic protocols, lattice-based cryptography, homomorphic encryption, and post-quantum cryptography. Students will analyze cutting-edge cryptographic research, explore threats posed by emerging technologies, and study real-world applications in areas like privacy-preserving computation, blockchain, and secure communications. Emphasis is placed on both the mathematical underpinnings and the implementation challenges of secure cryptographic solutions.

Recommended Textbook Cryptography and Network Security 6th Edition by William Stallings

Available Study Resources on Quizplus

20 Chapters

842 Verified Questions

842 Flashcards

Source URL: https://quizplus.com/study-set/3983 Page 2

Chapter 1: Overview

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80023

Sample Questions

Q1) A ___________ is any process,or a device incorporating such a process,that is designed to detect,prevent,or recover from a security attack.Examples are encryption algorithms,digital signatures and authentication protocols.

Answer: security mechanism

Q2) The OSI security architecture provides a systematic framework for defining security attacks,mechanisms,and services.

A)True

B)False

Answer: True

Q3) __________ prevents either sender or receiver from denying a transmitted message.Thus,when a message is sent,the receiver can prove that the alleged sender in fact sent the message and when a message is received,the sender can prove that the alleged receiver in fact received the message.

Answer: Nonrepudiation

Q4) Two specific authentication services defined in X.800 are peer entity authentication and _________ authentication.

Answer: data origin

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: Classical Encryption Techniques

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80022

Sample Questions

Q1) Techniques used for deciphering a message without any knowledge of the enciphering details is ___________ .

A)blind deciphering

B)steganography

C)cryptanalysis

D)transposition

Answer: C

Q2) __________ attacks exploit the characteristics of the algorithm to attempt to deduce a specific plaintext or to deduce the key being used.

A)Brute-force

B)Cryptanalytic

C)Block cipher

D)Transposition

Answer: B

Q3) Cryptographic systems are characterized along three independent dimensions: The type of operations used for transforming plaintext to ciphertext;The way in which the plaintext is processed;and __________ .

Answer: The number of keys used

To view all questions and flashcards with answers, click on the resource link above.

4

Chapter 3: Block Ciphers and the Data Encryption Standard

Available Study Resources on Quizplus for this Chatper

27 Verified Questions

27 Flashcards

Source URL: https://quizplus.com/quiz/80021

Sample Questions

Q1) A sequence of plaintext elements is replaced by a __________ of that sequence which means that no elements are added,deleted or replaced in the sequence,but rather the order in which the elements appear in the sequence is changed.

A)permutation

B)diffusion

C)stream

D)substitution

Answer: A

Q2) Feistel's is a practical application of a proposal by Claude Shannon to develop a product cipher that alternates confusion and ________ functions. Answer: diffusion

Q3) The vast majority of network-based symmetric cryptographic applications make use of ________ ciphers.

A)linear

B)block

C)permutation

D)stream

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

5

Chapter 4: Basic Concepts in Number Theory and Finite

Fields

Available Study Resources on Quizplus for this Chatper

26 Verified Questions

26 Flashcards

Source URL: https://quizplus.com/quiz/80020

Sample Questions

Q1) As a congruence relation,mod expresses that two arguments have the same remainder with respect to a given modulus.

A)True

B)False

Q2) The Advanced Encryption Standard uses infinite fields.

A)True

B)False

Q3) Unlike ordinary addition,there is not an additive inverse to each integer in modular arithmetic.

A)True

B)False

Q4) Polynomial arithmetic includes the operations of addition, subtraction and multiplication.

A)True

B)False

Q5) The polynomial cx)is said to be the __________ of ax)and bx)if cx)divides both ax)and bx)and any divisor of ax)and bx)is a divisor of cx).

To view all questions and flashcards with answers, click on the resource link above. Page 6

Q6) A zero-degree polynomial is called a __________ polynomial and is simply an element of the set of coefficients.

Chapter 5: Advanced Encryption Standard

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80019

Sample Questions

Q1) As with any block cipher,AES can be used to construct a message authentication code,and for this,only decryption is used.

A)True

B)False

Q2) The AES cipher begins and ends with an)_________ stage because any other stage, applied at the beginning or end,is reversible without knowledge of the key and would add no security.

A)Substitute bytes

B)AddRoundKey

C)MixColumns

D)ShiftRows

Q3) The inverse add round key transformation is identical to the forward add round key transformation because the XOR operation is its own inverse.

A)True

B)False

Q4) The AES key expansion algorithm takes as input a four-word 16-byte)key and produces a linear array of __________ words 176 bytes).

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Block Cipher Operation

Available Study Resources on Quizplus for this Chatper

44 Verified Questions

44 Flashcards

Source URL: https://quizplus.com/quiz/80018

Sample Questions

Q1) A mode of operation is a technique for enhancing the effect of a cryptographic algorithm or adapting the algorithm for an application.

A)True

B)False

Q2) The most significant characteristic of __________ is that if the same b-bit block of plaintext appears more than once in the message,it always produces the same ciphertext.

Q3) _________ mode is similar to Cipher Feedback,except that the input to the encryption algorithm is the preceding DES output.

A)Cipher Feedback

B)Counter

C)Output Feedback

D)Cipher Block Chaining

Q4) A number of Internet based applications have adopted two-key 3DES,including PGP and S/MIME.

A)True

B)False

Q5) The__________ is a technique in which an encryption algorithm is used multiple times.

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Random and Pseudorandom Number

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80017

Sample Questions

Q1) A pseudorandom number generator takes as input a fixed value called the __________ and produces a sequence of output bits using a deterministic algorithm.

A)seed

B)fixed skew

C)entropy source

D)keystream

Q2) An algorithm that is used to produce an open-ended sequence of bits is referred to as a ___________ .

Q3) __________ algorithms are designed specifically and solely for the purpose of generating pseudorandom bit streams.

Q4) The __________ test is the most basic test of randomness and must be included in any test suite.

A)frequency

B)runs

C)unpredictability

D)Maurer

Q5) A __________ is a symmetric encryption algorithm in which ciphertext output is produced bit-by-bit or byte-by-byte from a stream of plaintext input.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: More Number Theory

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80016

Sample Questions

Q1) Two numbers are relatively prime if they have _________ prime factors in common.

A)some

B)zero

C)multiple

D)all

Q2) Discrete logarithms are fundamental to the digital signature algorithm and the _________ algorithm.

Q3) Prime numbers play a _________ role in number theory.

A)minor

B)nonessential

C)critical

D)abbreviated

Q4) A prime number can have a remainder when divided by positive or negative values of itself.

A)True

B)False

Q5) The first assertion of the CRT,concerning arithmetic operations, follows from the rules for modular arithmetic.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Public-Key Cryptography and Rsa

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80015

Sample Questions

Q1) The key used in symmetric encryption is referred to as a __________ key.

A)public

B)secret

C)private

D)decryption

Q2) The readable message or data that is fed into the algorithm as input is the

A)ciphertext

B)exchange

C)plaintext

D)encryption

Q3) __________ are two related keys,a public key and a private key that are used to perform complementary operations,such as encryption and decryption or signature generation and signature verification.

A)Asymmetric keys

B)Key exchanges

C)Symmetric keys

D)Cipher keys

Q4) The scrambled message produced as output is the __________ .It depends on the plaintext and the key.

11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Other Public-Key Cryptosystems

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80014

Sample Questions

Q1) ____________ makes use of elliptic curves in which the variables and coefficients are all restricted to elements of a finite field.

A)Prime curve

B)Elliptic curve cryptography(ECC)

C)abelian group

D)Micali-Schnorr

Q2) The principal attraction of __________,compared to RSA,is that it appears to offer equal security for a far smaller key size,thereby reducing processing overhead.

Q3) The security of ElGamal is based on the difficulty of computing discrete logarithms.

A)True

B)False

Q4) For a ___________ defined over GF2m),the variables and coefficients all take on values in GF2m)and in calculations are performed over GF2m).

A)cubic equation

B)prime curve

C)binary curve

D)abelian group

To view all questions and flashcards with answers, click on the resource link above.

12

Chapter 11: Cryptographic Hash Functions

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80013

Sample Questions

Q1) The effort required for a collision resistant attack is explained by a mathematical result referred to as the ___________ .

A)Whirlpool

B)birthday paradox

C)hash value

D)message authentication code

Q2) A message authentication code is also known as a __________ hash function.

Q3) The cryptographic hash function is not a versatile cryptographic algorithm.

A)True

B)False

Q4) Message authentication is achieved using a __________ .

A)DES

B)MDF

C)SHA

D)MAC

Q5) The principal object of a hash function is __________ .

A)data integrity

B)compression

C)collision resistance

D)mapping messages

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Message Authentication Codes

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80012

Sample Questions

Q1) HMAC is a widely used standardized _________ function and is implemented in many protocols and applications.

Q2) _________ encryption provides authentication among those who share the secret key.

A)Message

B)Asymmetric

C)Symmetric

D)Authenticated

Q3) The __________ algorithm can be defined as using the cipher block chaining mode of operation of DES with an initialization vector of zero.

Q4) A CTR-based authenticated encryption approach is the most efficient mode of operation for high-speed packet networks.

A)True

B)False

Q5) An important characteristic of the MAC algorithm is that it needs to be reversible. A)True

B)False

Q6) The HtE approach is used in the __________ protocol to protect WiFi networks.

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 13: Digital Signatures

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80011

Sample Questions

Q1) The DSS makes use of the Secure Hash Algorithm and presents a new digital signature technique known as the ______________ .

Q2) The first stage in generating an RSA-PSS signature of a message M is to generate from M a fixed-length message digest,called an ______________.

Q3) The term __________ refers to a digital signature scheme that involves only the communicating parties.

Q4) Message authentication protects two parties who exchange messages from any third party,however,it does not protect the two parties against each other.

A)True

B)False

Q5) The __________ is formed by taking the hash of the message and encrypting the message with the creator's private key.

A)timestamp

B)message digest

C)hash code

D)digital signature

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Key Management and Distribution

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80010

Sample Questions

Q1) The principal objective for developing a _________ is to enable secure,convenient and efficient acquisition of public keys.

A)KDC

B)IETF

C)PKI

D)CRL

Q2) Although public announcement of public keys is convenient, anyone can forge a public announcement.

A)True

B)False

Q3) The topics of cryptographic key management and cryptographic key distribution are complex,involving cryptographic,protocol, and management considerations.

A)True

B)False

Q4) Several techniques have been proposed for the distribution of public keys.The proposals can be grouped into the following four general schemes: public announcement,publicly available directory,public-key certificates,and ____________.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: User Authentication Protocols

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80009

Sample Questions

Q1) The ticket granting ticket is encrypted with a secret key known only to the AS and the

Q2) The __________ approach is unsuitable for a connectionless type of application because it requires the overhead of a handshake before any connectionless transmission,effectively negating the chief characteristic of a connectionless transaction.

A)timestamp

B)backward reply

C)challenge-response

D)replay

Q3) An e-mail message should be encrypted such that the mail handling system is not in possession of the decryption key.

A)True

B)False

Q4) The first published report on Kerberos listed the following requirements: secure,reliable,scalable and __________ .

Q5) A __________ attack is where an opponent intercepts a message from the sender and replays it later when the timestamp in the message becomes current at the recipient's site.

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Network Access Control and Cloud Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80008

Sample Questions

Q1) _________ saves the complexity of software installation,maintenance,upgrades,and patches.

A)IaaS

B)SaaS

C)EAP

D)DHCP

Q2) An __________ is a server computer that negotiates the use of a specific EAP method with an EAP peer,validates the EAP peer's credentials,and authorizes access to the network.

Q3) With a ________ infrastructure,the cloud infrastructure is a composition of two or more clouds that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability.

Q4) With a _________ infrastructure,the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.

A)hybrid cloud

B)private cloud

C)public cloud

D)community cloud

To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 17: Transport-Level Security

Available Study Resources on Quizplus for this Chatper

26 Verified Questions

26 Flashcards

Source URL: https://quizplus.com/quiz/80007

Sample Questions

Q1) The shared master secret is a one-time 48-byte value generated for a session by means of secure key exchange.

A)True

B)False

Q2) _________ require a client write MAC secret,a server write MAC secret,a client write key,a server write key,a client write IV,and a server write IV,which are generated from the master secret in that order.

Q3) Two important SSL concepts are the SSL session and the SSL _________ .

Q4) __________ provides security services between Transport Layer Protocol and applications that use TCP.

Q5) TLS makes use of a pseudorandom function referred to as __________ to expand secrets into blocks of data for purposes of key generation or validation.

Q6) _________ attacks include impersonating another user,altering messages in transit between client and server and altering information on a Web site.

A)Active

B)Passive

C)Shell

D)Psuedo

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Wireless Network Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80006

Sample Questions

Q1) MAC spoofing occurs when an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network privileges.

A)True

B)False

Q2) Handheld PDAs pose a security risk in terms of both eavesdropping and spoofing.

A)True

B)False

Q3) __________ is the primary service used by stations to exchange MPDUs when the MPDUs must traverse the DS to get from a station in one BSS to a station in another BSS.

Q4) The IEEE 802.11 protocol stack consists of the logical link control layer,the medium access control layer,and the _________ layer.

Q5) An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.

Q6) In order to accelerate the introduction of strong security into WLANs,the Wi-Fi Alliance promulgated __________ as a set of security mechanisms for the Wi-Fi standard.

To view all questions and flashcards with answers, click on the resource link above.

Page 20

Chapter 19: Electronic Mail Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80005

Sample Questions

Q1) __________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP.

A)S/MIME

B)MIME

C)DKIM

D)HTTPS

Q2) A specification for cryptographically signing e-mail messages permitting a signing domain to claim responsibility for a message in the mail stream,_________ allow message recipients to verify the signature by querying the signer's domain directly to retrieve the appropriate public key and thereby confirming that the message was attested to by a party in possession of the private key for the signing domain.

Q3) PGP provides confidentiality through the use of asymmetric block encryption.

A)True

B)False

Q4) The key legitimacy field,the signature trust field and the owner trust field are each contained in a structure referred to as a ___________ .

Q5) ___________ is an open-source,freely available software package for e-mail security.

To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 20: Ip Security

Available Study Resources on Quizplus for this Chatper

44 Verified Questions

44 Flashcards

Source URL: https://quizplus.com/quiz/80004

Sample Questions

Q1) Confidentiality is provided by an encryption format known as __________ .

Q2) Additional padding may be added to provide partial traffic flow confidentiality by concealing the actual length of the payload.

A)True

B)False

Q3) _________ defines a number of techniques for key management.

A)KEP

B)KMP

C)SKE

D)IKE

Q4) Any traffic from the local host to a remote host for purposes of an IKE exchange bypasses the IPsec processing.

A)True

B)False

Q5) Generic in that it does not dictate specific formats,the _________ is a key exchange protocol based on the Diffie-Hellman algorithm with added security.

Q6) At any point in an IKE exchange the sender may include a _________ payload to request the certificate of the other communicating entity.

To view all questions and flashcards with answers, click on the resource link above. Page 22

Turn static files into dynamic content formats.

Create a flipbook