Preview

09 - Additional Ciphers and security

 1. Cryptographic algorithms today usually rely on computational difficulty.
additionalciphers_q1.jpg

  TRUE

  FALSE

 2. Computational difficulty means …

  the cipher cannot be broken by any computer

  that no software is available to break the cipher

  how difficult the algorithm is to implement

  it would take most computers a very long time to break the cipher

 3. All pseudo-random keys can be theoretically broken by a computer.

  FALSE

  TRUE

 4. What is one way a computer can generate a random number?

  By multiplication tables

  By the frequency of keystrokes

  By using very large numbers

  By a sophisticated algorithm

 5. Governments sometimes require copies of encryption keys or backdoors to enable them to read encrypted messages.

  TRUE

  FALSE

 6. Websites can be verified using …

  a digital certificate

  a digital scroll

  a digital wallet

  a digital safe

 7. Twofish is an example of what type of cipher?

  redoubtable chain cipher

  asymmetric key cipher

  symmetric key block cipher

  algorithmic pender cipher

 8. What was the DES?

  Digital Encryption Signal

  Data Encryption Standard

  Diametric Encryption Security

  Direct Encryption Search

 9. AES is the only public cipher currently approved by the US NSA for top secret information.

  TRUE

  FALSE

 10. The only known vulnerability of AES is to …

  open-door infiltration

  key-hole attacks

  door-entryism

  side-channel attacks