<< Prev Question Next Question >>

Question 60/74

Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used public key cryptography algorithm. Based on relationships with prime numbers. This algorithm is secure because it is difficult to factor a large integer composed of two or more large prime factors.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (74q)
Question 1: Basic information theory is the basis for modern symmetric c...
Question 2: Which of the following algorithms uses three different keys ...
Question 3: Which of the following is generally true about key sizes?...
Question 4: Which of the following statements is most true regarding bin...
Question 5: Which one of the following uses three different keys, all of...
Question 6: With Cipher feedback (CFB) what happens?...
Question 7: Original, unencrypted information is referred to as ____....
Question 8: Which of the following asymmetric algorithms is described by...
Question 9: A _____ is a function is not reversible....
Question 10: Calculates the average LSB and builds a table of frequencies...
Question 11: Asymmetric encryption method developed in 1984. It is used i...
Question 12: Which of the following Secure Hashing Algorithm (SHA) produc...
Question 13: Bob's password is hashed, and so is John's. Even though they...
Question 14: Storing private keys with a third party is referred to as wh...
Question 15: If the round function is a cryptographically secure pseudora...
Question 16: John is trying to explain the basics of cryptography to a gr...
Question 17: This is a 128 bit hash that is specified by RFC 1321. It was...
Question 18: Which of the following is the successor of SSL?...
Question 19: With Electronic codebook (ECB) what happens:...
Question 20: What advantage do symmetric algorithms have over asymmetric ...
Question 21: Cylinder tool. Wrap leather around to decode. The diameter i...
Question 22: A number that is used only one time, then discarded is calle...
Question 23: Which of the following uses an 80 bit key on 64 bit blocks?...
Question 24: What is a TGS?
Question 25: In a Feistel cipher, the two halves of the block are swapped...
Question 26: Which of the following equations is related to EC?...
Question 27: The art and science of writing hidden messages so that no on...
Question 28: What is the largest key size that AES can use?...
Question 29: What best describes the shifting of each letter a fixed numb...
Question 30: This algorithm was published by the German engineering firm ...
Question 31: During the process of encryption and decryption, what keys a...
Question 32: The mode makes a block cipher into a synchronous stream ciph...
Question 33: What is the name of the attack where the attacker obtains th...
Question 34: If you XOR 10111000 with 10101010, what is the result?...
Question 35: Denis is looking at an older system that uses DES encryption...
Question 36: What is a "Collision attack" in cryptography?...
Question 37: Which of the following is a key exchange protocol?...
Question 38: Protocol suite provides a method of setting up a secure chan...
Question 39: Which of the following is a substitution cipher used by anci...
Question 40: The next number is derived from adding together the prior tw...
Question 41: RFC 1321 describes what hash?
Question 42: In steganography, ________ is the data to be covertly commun...
Question 43: Which of the following was a multi alphabet cipher widely us...
Question 44: In a ______ the attacker discovers a functionally equivalent...
Question 45: Which of the following is not a key size used by AES?...
Question 46: The reverse process from encoding - converting the encoded m...
Question 47: Which one of the following is an example of a symmetric key ...
Question 48: How did the ATBASH cipher work?...
Question 49: What is the formula m^e %n related to?...
Question 50: Juanita is attempting to hide some text into a jpeg file. Hi...
Question 51: How can rainbow tables be defeated?...
Question 52: Which of the following is assured by the use of a hash?...
Question 53: Which one of the following terms describes two numbers that ...
Question 54: What is a variation of DES that uses a technique called Key ...
Question 55: You have been tasked with selecting a digital certificate st...
Question 56: In IPSec, if the VPN is a gateway-gateway or a host-gateway,...
Question 57: In 1977 researchers and MIT described what asymmetric algori...
Question 58: An authentication method that periodically re-authenticates ...
Question 59: Jane is looking for an algorithm to ensure message integrity...
Question 60: Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adlem...
Question 61: Manipulating individuals so that they will divulge confident...
Question 62: What size block does AES work on?...
Question 63: A cryptanalysis success where the attacker deduces the secre...
Question 64: Which of the following is a block cipher?...
Question 65: Cryptographic hashes are often used for message integrity an...
Question 66: A real time protocol for verifying certificates (and a newer...
Question 67: WPA2 uses AES for wireless data encryption at which of the f...
Question 68: Encryption of the same plain text with the same key results ...
Question 69: Frank is trying to break into an encrypted file... He is att...
Question 70: A 160-bit hash algorithm developed by Hans Dobbertin, Antoon...
Question 71: Ahlen is using a set of pre-calculated hashes to attempt to ...
Question 72: Which one of the following attempts to hide data in plain vi...
Question 73: Network of trusted certificate authority servers. Use asymme...
Question 74: In relationship to hashing, the term _____refers to random b...