Applied Cryptography Review Questions - 842 Verified Questions

Page 1


Applied Cryptography Review Questions

Course Introduction

Applied Cryptography explores the practical aspects of securing communications and data through cryptographic methods. The course covers fundamental concepts such as symmetric and asymmetric encryption, hash functions, digital signatures, key exchange protocols, and cryptographic authentication. Students will analyze real-world cryptographic systems, address implementation challenges, and study protocols used in modern applications like secure email, online banking, and blockchain technologies. Emphasis is placed on understanding vulnerabilities, best practices for deployment, and the balance between security and efficiency in real systems.

Recommended Textbook Cryptography and Network Security 6th Edition by William Stallings

Available Study Resources on Quizplus

20 Chapters

842 Verified Questions

842 Flashcards

Source URL: https://quizplus.com/study-set/3983

Page 2

Chapter 1: Overview

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80023

Sample Questions

Q1) In the context of network security,___________ is the ability to limit and control the access to host systems and applications via communications links.

Answer: access control

Q2) __________ involves the passive capture of a data unit and its subsequent retransmission to produce an unauthorized effect.

A)Disruption

B)Replay

C)Service denial

D)Masquerade

Answer: B

Q3) __________ is the use of a trusted third party to assure certain properties of a data exchange.

Answer: Notarization

Q4) Patient allergy information is an example of an asset with a high requirement for integrity.

A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Classical Encryption Techniques

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80022

Sample Questions

Q1) Ciphertext generated using a computationally secure encryption scheme is impossible for an opponent to decrypt simply because the required information is not there.

A)True

B)False

Answer: False

Q2) A technique for hiding a secret message within a larger document or picture in such a way that others cannot discern the presence or contents of the hidden message is

Answer: Steganography

Q3) When using symmetric encryption it is very important to keep the algorithm secret.

A)True

B)False

Answer: False

Q4) Steganography renders the message unintelligible to outsiders by various transformations of the text.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Block Ciphers and the Data Encryption Standard

Available Study Resources on Quizplus for this Chatper

27 Verified Questions

27 Flashcards

Source URL: https://quizplus.com/quiz/80021

Sample Questions

Q1) Two alternatives to DES are AES and _________ DES. Answer: triple

Q2) Feistel's is a practical application of a proposal by Claude Shannon to develop a product cipher that alternates confusion and ________ functions.

Answer: diffusion

Q3) In ___________ the statistical structure of the plaintext is dissipated into long-range statistics of the ciphertext.This is achieved by having each plaintext digit affect the value of many ciphertext digits.

Answer: diffusion

Q4) Fast software encryption/decryption and ease of analysis are two considerations in the design of a Feistel cipher.

A)True

B)False

Answer: True

Q5) The heart of a Feistel block cipher is the function F,which relies on the use of S-boxes. A)True

B)False

Answer: True

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Basic Concepts in Number Theory and Finite

Fields

Available Study Resources on Quizplus for this Chatper

26 Verified Questions

26 Flashcards

Source URL: https://quizplus.com/quiz/80020

Sample Questions

Q1) A ring is said to be _________ if it satisfies the condition ab = ba for all a,b in R.

A)cyclic

B)commutative

C)abelian

D)infinite

Q2) The polynomial cx)is said to be the __________ of ax)and bx)if cx)divides both ax)and bx)and any divisor of ax)and bx)is a divisor of cx).

Q3) In the context of abstract algebra we are usually not interested in evaluating a polynomial for a particular value of x.To emphasize this point the variable x is sometimes referred to as the __________ .

A)monic

B)constant

C)indeterminate

D)coefficient

Q4) Polynomial arithmetic includes the operations of addition, subtraction and multiplication.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Advanced Encryption Standard

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80019

Sample Questions

Q1) The Advanced Encryption Standard was published by the __________ in 2001.

A)ARK

B)FIPS

C)IEEE

D)NIST

Q2) The first row of State is not altered;for the second row a 1-byte circular left shift is performed;for the third row a 2-byte circular left shift is performed;and for the fourth row a 3-byte circular left shift is performed.This transformation is called __________ .

A)AddRoundKey

B)ShiftRows

C)MixColumns

D)Substitute bytes

Q3) In the AES structure both encryption and decryption ciphers begin with an) __________ stage,followed by nine rounds that each include all four stages, followed by a tenth round of three stages.

A)Substitute bytes

B)AddRoundKey

C)MixColumns

D)ShiftRows

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Block Cipher Operation

Available Study Resources on Quizplus for this Chatper

44 Verified Questions

44 Flashcards

Source URL: https://quizplus.com/quiz/80018

Sample Questions

Q1) There are no practical cryptanalytic attacks on 3DES.

A)True

B)False

Q2) The plaintext of a sector or data unit is organized in to blocks of 128 bits.For encryption and decryption,each block is treated independently.The only exception occurs when the last block has less than 128 bits.In that case the last two blocks are encrypted/decrypted using a ___________ technique instead of padding.

Q3) Cipher Feedback Mode conforms to the typical construction of a stream cipher.

A)True

B)False

Q4) One of the most widely used multiple-encryption scheme is __________ .

Q5) The __________ method is ideal for a short amount of data and is the appropriate mode to use if you want to transmit a DES or AES key securely.

A)cipher feedback mode

B)counter mode

C)output feedback mode

D)electronic codebook mode

Q6) The__________ is a technique in which an encryption algorithm is used multiple times.

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Random and Pseudorandom Number

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80017

Sample Questions

Q1) A __________ uses a nondeterministic source to produce randomness.

A)CSPRBG

B)TRNG

C)PRNG

D)BBS

Q2) Two approaches that use a block cipher to build a PNRG and have gained widespread acceptance are:

A)CTR mode and CFB mode

B)CTR mode and OFB mode

C)CBC mode and CFB mode

D)OFB mode and ECB mode

Q3) A fundamental requirement of the RSA public-key encryption scheme is the ability to generate _________ numbers.

Q4) A cryptographically secure pseudorandom bit generator is defined as one that passes the least significant bit test.

A)True

B)False

Q5) __________ algorithms are designed specifically and solely for the purpose of generating pseudorandom bit streams.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: More Number Theory

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80016

Sample Questions

Q1) A _________ number can only be divided by +/- values of itself and 1 and cannot have a remainder.

A)prime

B)composite

C)indexed

D)positive

Q2) All integers have primitive roots.

A)True

B)False

Q3) The mapping of the CRT equation is a one-to-one correspondence called a _________ between Zm and the Cartesian product Zm1 X Zm2 X ...X Zmk.

Q4) The _________ algorithm is typically used to test a large number for primality.

A)Rijndael

B)Fermat

C)Miller-Rabin

D)Euler

Q5) __________ theorem states the following: If p is prime and a is a positive integer not divisible by p,then ap-1 = 1mod p).

Q6) Two numbers are __________ if their greatest common divisor is 1.

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Public-Key Cryptography and Rsa

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80015

Sample Questions

Q1) A __________ is one that maps a domain into a range such that every function value has a unique inverse,with the condition that the calculation of the function is easy,whereas the calculation of the inverse is infeasible.

Q2) The __________ is a set of policies,processes,server platforms,software and workstations used for the purpose of administering certificates and public-private key pairs,including the ability to issue,maintain,and revoke public key certificates.

Q3) A __________ is a cryptographic algorithm that uses two related keys,a public key and a private key.The two keys have the property that deriving the private key from the public key is computationally infeasible.

A)Private Key Symmetric Cryptographic Algorithm

B)Key Exchange Cryptographic Algorithm

C)Public Key Asymmetric Cryptographic Algorithm

D)RSA Digital Cryptographic Algorithm

Q4) Public-key cryptography is asymmetric,involving the use of two separate keys,in contrast to ___________ encryption,which uses only one key.

Q5) __________ encryption is a form of cryptosystem in which encryption and decryption are performed using a public key and a private key.

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Other Public-Key Cryptosystems

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80014

Sample Questions

Q1) The __________ key exchange involves multiplying pairs of nonzero integers modulo a prime number q.Keys are generated by exponentiation over the group with exponentiation defined as repeated multiplication.

A)Diffie-Hellman

B)Rabin-Miller

C)Micali-Schnorr

D)ElGamal

Q2) The purpose of the ___________ algorithm is to enable two users to securely exchange a key that can then be used for subsequent encryption of messages.

Q3) Asymmetric algorithms are typically much slower than symmetric algorithms so they are not used to generate open-ended __________ generator bit streams.

Q4) The Diffie-Hellman key exchange is a simple public-key algorithm.

A)True

B)False

Q5) Most of the products and standards that use public-key cryptography for encryption and digital signatures use RSA.

A)True B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Cryptographic Hash Functions

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80013

Sample Questions

Q1) Big-endian format is the most significant byte of a word in the low-address byte position.

A)True B)False

Q2) A good hash function has the property that the results of applying the function to a large set of inputs will produce outputs that are evenly distributed and apparently random.

A)True

B)False

Q3) An ideal hash algorithm will require a cryptanalytic effort __________ the brute-force effort.

A)less than or equal to B)greater than or equal to C)less than D)greater than

Q4) Message authentication is achieved using a __________ .

A)DES

B)MDF

C)SHA

D)MAC

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Message Authentication Codes

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80012

Sample Questions

Q1) Any modification to a sequence of messages between parties,including insertion,deletion,and reordering is a __________ attack.

Q2) The MAC function is a __________ function.

A)one-to-many

B)many-to-one

C)one-to-one

D)one-to-two

Q3) The HtE approach is used in the __________ protocol to protect WiFi networks.

Q4) As with encryption algorithms and hash functions cryptanalytic attacks on MAC algorithms seek to exploit some property of the algorithm to perform some attack other than an exhaustive search.

A)True

B)False

Q5) The security of any MAC function based on an embedded hash function depends in some way on the cryptographic strength of the underlying hash function.

A)True

B)False

Q6) NIST SP 800-90,IEEE 802.11i,and TLS/WTLS are three ____________ based on HMAC.

Q7) Discovery of the pattern of traffic between parties is a __________ attack.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Digital Signatures

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80011

Sample Questions

Q1) A digital signature can guarantee the integrity but not the source of the message.

A)True

B)False

Q2) _________ specifies that if the signature generation process results in a value of s = 0 a new value of k should be generated and the signature should be recalculated.

Q3) The DSS approach makes use of a hash function.

A)True

B)False

Q4) With a __________ attack the attacker is given access to a set of messages and their signatures.

A)known message

B)key-only

C)directed chosen message

D)generic chosen message

Q5) The global public key components for DSA are p,q,and h.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Key Management and Distribution

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80010

Sample Questions

Q1) If encryption is done at the __________ level a key is needed for every pair of users or processes that require communication.

Q2) The principal objective for developing a _________ is to enable secure,convenient and efficient acquisition of public keys.

A)KDC

B)IETF

C)PKI

D)CRL

Q3) Communication between end systems is encrypted using a _________ key.

A)session

B)master

C)permanent

D)message

Q4) X.509 defines the format for private-key certificates.

A)True

B)False

Q5) __________ certificates are used in most network security applications including IP security,transport layer security and S/MIME.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: User Authentication Protocols

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80009

Sample Questions

Q1) The _________ is responsible for generating keys to be used for a short time over a connection between two parties and for distributing those keys using the master keys to protect the distribution.

Q2) The first published report on Kerberos listed the following requirements: secure,reliable,scalable and __________ .

Q3) Examples of dynamic biometrics include recognition by fingerprint, retina,and face.

A)True

B)False

Q4) A solution,which eliminates the burden of each server having to confirm the identities of clients who request service,is to use an __________ that knows the passwords of all users and stores these in a centralized database and shares a unique secret key with each server.

Q5) A common item of authentication information associated with a user is a

A)nonce

B)timestamp

C)ticket

D)password

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: Network Access Control and Cloud Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80008

Sample Questions

Q1) _________ is a client computer that is attempting to access a network.

A)EAP peer

B)PSK

C)NAC

D)RAS

Q2) The Cloud Security Alliance defines _______ as the provision of security applications and services via the cloud either to cloud-based infrastructure and software or from the cloud to the customers' on-premise systems.

Q3) A _________ is a person or organization that maintains a business relationship with,and uses service from,cloud providers.

A)cloud auditor

B)cloud broker

C)cloud carrier

D)cloud consumer

Q4) _________ is a model for enabling ubiquitous,convenient,on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Q5) __________ are third party audits of cloud services.

To view all questions and flashcards with answers, click on the resource link above. Page 18

Chapter 17: Transport-Level Security

Available Study Resources on Quizplus for this Chatper

26 Verified Questions

26 Flashcards

Source URL: https://quizplus.com/quiz/80007

Sample Questions

Q1) _________ attacks include impersonating another user,altering messages in transit between client and server and altering information on a Web site.

A)Active

B)Passive

C)Shell

D)Psuedo

Q2) The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets.

A)True

B)False

Q3) __________ provides security services between Transport Layer Protocol and applications that use TCP.

Q4) Phase _________ of the Handshake Protocol establishes security capabilities.

A)4

B)1

C)2

D)3

Q5) A signature is created by taking the hash of a message and encrypting it with the sender's _________ .

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Wireless Network Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80006

Sample Questions

Q1) The DS can be a switch,a wired network,or a wireless network.

A)True

B)False

Q2) In simple terms,the wireless environment consists of three components that provide point of attack: the endpoint,the ______________,and the access point.

Q3) Security policies for mobile devices should assume that any mobile device will not be stolen or accessed by a malicious party.

A)True

B)False

Q4) The integration service enables transfer of data between a station on an IEEE 802.11 LAN and a station on an integrated IEEE 802.x LAN.

A)True

B)False

Q5) An __________ is a set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.

Q6) The MPDU authentication phase consists of three phases.They are: connect to AS,EAP exchange and _________ .

To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 19: Electronic Mail Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/80005

Sample Questions

Q1) A means of generating predictable PGP session keys is needed.

A)True

B)False

Q2) Computed by PGP,a _________ field indicates the extent to which PGP will trust that this is a valid public key for this user;the higher the level of trust,the stronger the binding of this user ID to this key.

Q3) __________ is an Internet standard approach to e-mail security that incorporates the same functionality as PGP.

A)S/MIME

B)MIME

C)DKIM

D)HTTPS

Q4) PGP provides confidentiality through the use of asymmetric block encryption.

A)True

B)False

Q5) E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 21

Chapter 20: Ip Security

Available Study Resources on Quizplus for this Chatper

44 Verified Questions

44 Flashcards

Source URL: https://quizplus.com/quiz/80004

Sample Questions

Q1) Both tunnel and transport modes can be accommodated by the encapsulating security payload encryption format.

A)True

B)False

Q2) The term _________ refers to a sequence of SAs through which traffic must be processed to provide a desired set of IPsec services.

Q3) By implementing security at the IP level an organization can ensure secure networking not only for applications that have security mechanisms but also for the many security ignorant applications.

A)True

B)False

Q4) Transport mode provides protection to the entire IP packet.

A)True

B)False

Q5) The default automated key management protocol for IPsec is referred to as ISAKMP/Oakley.

A)True B)False

Q6) Authentication makes use of the _________ message authentication code.

Page 22

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook