Which of the following is a fundamental principle of cryptography that holds that the algorithm can be publicly disclosed without damaging security?
An attack that is particularly successful against block ciphers based on substitution-permutation networks. For a block size b, holds b-k bits constant and runs the other k through all 2k possibilities. For k=1, this is just deferential cryptanalysis, but with k>1 it is a new technique.
A cryptanalysis success where the attacker discovers additional plain texts (or cipher texts) not previously known.
A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.
What size block does AES work on?
Modern symmetric ciphers all make use of one or more s-boxes. Both Feistel and non-Feistel ciphers use these s-boxes. What is an s-box?
What best describes the shifting of each letter a fixed number of spaces to the left or right?
This is a proprietary version of PAP. Encrypts username and password as it is sent across network.
Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?
In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
ECCouncil Free Exams |
---|
![]() |