09 - Additional Ciphers and security

 1. Cryptographic algorithms today usually rely on computational difficulty.



 2. Computational difficulty means …

  that no software is available to break the cipher

  how difficult the algorithm is to implement

  the cipher cannot be broken by any computer

  it would take most computers a very long time to break the cipher

 3. All pseudo-random keys can be theoretically broken by a computer.



 4. What is one way a computer can generate a random number?

  By using very large numbers

  By multiplication tables

  By a sophisticated algorithm

  By the frequency of keystrokes

 5. Governments sometimes require copies of encryption keys or backdoors to enable them to read encrypted messages.



 6. Websites can be verified using …

  a digital safe

  a digital certificate

  a digital wallet

  a digital scroll

 7. Twofish is an example of what type of cipher?

  redoubtable chain cipher

  algorithmic pender cipher

  asymmetric key cipher

  symmetric key block cipher

 8. What was the DES?

  Digital Encryption Signal

  Direct Encryption Search

  Diametric Encryption Security

  Data Encryption Standard

 9. AES is the only public cipher currently approved by the US NSA for top secret information.



 10. The only known vulnerability of AES is to …

  open-door infiltration

  key-hole attacks

  side-channel attacks