Preview

09 - Additional Ciphers and security

 1. Cryptographic algorithms today usually rely on computational difficulty.
additionalciphers_q1.jpg

  TRUE

  FALSE

 2. Computational difficulty means …

  how difficult the algorithm is to implement

  that no software is available to break the cipher

  the cipher cannot be broken by any computer

  it would take most computers a very long time to break the cipher

 3. All pseudo-random keys can be theoretically broken by a computer.

  FALSE

  TRUE

 4. What is one way a computer can generate a random number?

  By the frequency of keystrokes

  By using very large numbers

  By multiplication tables

  By a sophisticated algorithm

 5. Governments sometimes require copies of encryption keys or backdoors to enable them to read encrypted messages.

  TRUE

  FALSE

 6. Websites can be verified using …

  a digital certificate

  a digital wallet

  a digital safe

  a digital scroll

 7. Twofish is an example of what type of cipher?

  asymmetric key cipher

  symmetric key block cipher

  redoubtable chain cipher

  algorithmic pender cipher

 8. What was the DES?

  Direct Encryption Search

  Diametric Encryption Security

  Data Encryption Standard

  Digital Encryption Signal

 9. AES is the only public cipher currently approved by the US NSA for top secret information.

  TRUE

  FALSE

 10. The only known vulnerability of AES is to …

  side-channel attacks

  door-entryism

  open-door infiltration

  key-hole attacks