Preview

09 - Additional Ciphers and security

 1. Cryptographic algorithms today usually rely on computational difficulty.
additionalciphers_q1.jpg

  FALSE

  TRUE

 2. Computational difficulty means …

  how difficult the algorithm is to implement

  the cipher cannot be broken by any computer

  it would take most computers a very long time to break the cipher

  that no software is available to break the cipher

 3. All pseudo-random keys can be theoretically broken by a computer.

  TRUE

  FALSE

 4. What is one way a computer can generate a random number?

  By a sophisticated algorithm

  By multiplication tables

  By using very large numbers

  By the frequency of keystrokes

 5. Governments sometimes require copies of encryption keys or backdoors to enable them to read encrypted messages.

  TRUE

  FALSE

 6. Websites can be verified using …

  a digital wallet

  a digital scroll

  a digital safe

  a digital certificate

 7. Twofish is an example of what type of cipher?

  algorithmic pender cipher

  redoubtable chain cipher

  symmetric key block cipher

  asymmetric key cipher

 8. What was the DES?

  Data Encryption Standard

  Diametric Encryption Security

  Digital Encryption Signal

  Direct Encryption Search

 9. AES is the only public cipher currently approved by the US NSA for top secret information.

  TRUE

  FALSE

 10. The only known vulnerability of AES is to …

  side-channel attacks

  open-door infiltration

  door-entryism

  key-hole attacks