Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.
A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.
A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.
What size block does AES work on?
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
What best describes the shifting of each letter a fixed number of spaces to the left or right?
This is a proprietary version of PAP. Encrypts username and password as it is sent across network.
Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?
In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
| PDF + Testing Engine | 
|---|
| $57.75 | 
| Testing Engine | 
|---|
| $43.75 | 
| PDF (Q&A) | 
|---|
| $36.75 | 
| ECCouncil Free Exams | 
|---|
|   |