Frage 1
Frage
What is the purpose of access control list?
Antworten
-
to enforce a specified security policy
-
to prevent unauthorised access to data
-
to emphasize encryption
-
it is a key distribution center
Frage 2
Frage
Identify definition of authentication
Antworten
-
establishes the identity of a subject
-
specifies and enforces that each object is accessed correctly and only by those that are allowed to do so
-
to enforce a specified security policy
-
to emphasize encryption
Frage 3
Frage
What does Access Control Information cover?
Frage 4
Frage
What does Access Control Enforcement cover?
Frage 5
Frage
What does Access Control Decision Function cover?
Frage 6
Frage
Define a subject of Access Control List
Antworten
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Frage 7
Frage
Define an object of Access Control List
Antworten
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Frage 8
Frage
How many types of resource dependent access controls exist?
Frage 9
Frage
How many types of access control mechanisms exist
Frage 10
Frage
Find an example of resource dependent access for network access
Antworten
-
append
-
execute
-
redirected
-
granted
Frage 11
Frage
Find an example of resource dependent access for file access
Antworten
-
append
-
execute
-
redirected
-
granted
Frage 12
Frage
Find incorrect access control goal
Antworten
-
invalid operations should be permitted
-
every actions should be checked
-
unnecessary access should not be allowed
-
all the above mentioned
Frage 13
Frage
What is a property of the capability ticket in access control list?
Antworten
-
Specifies a given subject can perform what operations on what objects
-
Subjects does not grant rights to other subjects
-
Users have only one ticket
-
Access rights given to a subject are valid for forever
Frage 14
Frage
What is a property of the procedure oriented objects in access control list?
Antworten
-
Objects are encapsulated, permitting only certain specified accesses via program execution
-
Specifies a given subject can perform what operations on what objects
-
Access rights given to a subject are valid for forever
-
Users have only one ticket
Frage 15
Frage
What is a property of the procedure oriented objects in access control list?
Antworten
-
Enforces accesses to an object be done through a trusted interface
-
Specifies a given subject can perform what operations on what objects
-
Access rights given to a subject are valid for forever
-
Users have only one ticket
Frage 16
Frage
What does multilevel security mean?
Antworten
-
Classification of information by the level of importance and permission of access by users with different security clearance
-
Classification of information by date and permission of access by users with different security clearance
-
Classification of information by the level of importance and permission of access by users name
-
Classification of information by date and permission of access by users name
Frage 17
Frage
How many levels are covered in multilevel security
Frage 18
Frage
No read up (read down) means
Antworten
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Frage 19
Frage
No write down (write up) means
Antworten
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Frage 20
Frage
Define a malware attacks
Antworten
-
Malicious software causes data compromises
-
A browser helper object that detects changes to URL and logs
-
Users are tricked by fraudulent messages into giving out information
-
The lookup of host names is altered to send users to a fraudulent server
Frage 21
Frage
How many types of authentication schemes exist?
Frage 22
Frage
Define a change cipher spec
Antworten
-
All data sent/received by software that uses SSL
-
used to carry handshake messages
-
used to indicates a change in the encryption and authentication of records
-
used to indicate when the connection is about to close
Frage 23
Antworten
-
All data sent/received by software that uses SSL
-
used to carry handshake messages
-
used to indicates a change in the encryption and authentication of records
-
used to indicate when the connection is about to close
Frage 24
Frage
Which of the following is true about importance of hash functions i. High Computational Load ii. Message Overhead iii. Security Limitations
Antworten
-
i only
-
none
-
All the mentioned
-
iii only
Frage 25
Frage
What does “computationally infeasible to find data mapping to specific hash” mean
Antworten
-
One way property
-
Collision free property
-
Second way property
-
Collision property
Frage 26
Frage
Which of the following is not property of hash functions?
Frage 27
Frage
How many types of hash constructions exist?
Frage 28
Frage
Output length for SHA-1
Frage 29
Frage
Input length for SHA-1
Frage 30
Frage
Which construction method support SHA?
Antworten
-
Schnorr
-
Diffie-Hellman
-
Merkle-Damgard
-
Alice & Bob
Frage 31
Frage
How many rounds in general hold SHA-1?
Frage 32
Frage
How many stages hold SHA-1?
Frage 33
Frage
How many rounds support one stage?
Frage 34
Frage
Name of the function that SHA-1 use
Antworten
-
Merkle-Damgard
-
Feistel
-
Schnorr
-
Diffie-Hellman
Frage 35
Frage
How many types of SHA exist ?
Frage 36
Frage
How many rounds MD5 hold in general?
Frage 37
Frage
Which of the following does not refer to security requirements of Hash functions?
Frage 38
Frage
The purpose of hash function is to
Antworten
-
Create a message
-
Compress a message
-
Divide a message
-
Conquer a message
Frage 39
Frage
How many constant keys support SHA algorithm ?
Frage 40
Frage
Which of the following refers requirement of digital signature?
Antworten
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be computationally infeasible to forge
Frage 41
Frage
Which of the following refers requirement of digital signature?
Antworten
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be practical to save digital signature in storage
Frage 42
Frage
What is the property of direct digital signature?
Antworten
-
Assumed receiver has sender’s private key
-
Involves only sender
-
Can encrypt using receiver’s public key
-
Assumed sender has receiver’s private key
Frage 43
Frage
Which of the following does not refer to characteristics of digital signature?
Antworten
-
Private/public is generated by receiver
-
A durable private/public key pair
-
A disposable private/public key pair
-
Signature is two numbers, depending on message hash and secret information
Frage 44
Frage
How many message authentication functions exist?
Frage 45
Frage
If public key encryption is used
Antworten
-
Encryption provides no confidence of sender
-
Encryption provides with some level of confidence of sender
-
Encryption provides fully confidence of sender
-
Encryption does not provided at all
Frage 46
Frage
In public key cryptography sender signs message using their
Antworten
-
Public key
-
Shared key
-
Private key
-
Third key
Frage 47
Frage
In public key cryptography sender signs message using their private key, then encrypts with recipient’s
Antworten
-
Private key
-
Public key
-
Single key
-
Key
Frage 48
Frage
What is authentication?
Frage 49
Frage
Define AAA.(triple A)
Antworten
-
Access After Anyone
-
Authentication Authorization Accounting
-
Authentication Authorization Access
-
Authentication Access Accounting
Frage 50
Frage
Which of the term refers to authorization?
Antworten
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
-
Accounting of service
Frage 51
Frage
Which of the term refers to accounting?
Antworten
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
-
Accounting of service
Frage 52
Frage
PIN, passwords refer to
Antworten
-
Something you have
-
Something you know
-
Something you are
-
Combined method
Frage 53
Frage
Keys, soft tokens refer to
Antworten
-
Something you have
-
Something you know
-
Something you are
-
Combined method
Frage 54
Frage
Fingerprint, iris, palm recognition refer to
Antworten
-
Something you have
-
Something you know
-
Something you are
-
Combined method
Frage 55
Frage
Combined or multiple methods of authentication are used for
Antworten
-
Lower level assurance
-
Medium level assurance
-
Higher level assurance
-
Not used at all
Frage 56
Frage
How many phases are exist in biometric?
Frage 57
Frage
When fingerprint was developed?
Frage 58
Frage 59
Antworten
-
TTP certifies trustworthiness of binding public key with its rightful owner’s identity
-
TTP certifies trustworthiness of binding private key with its rightful owner’s
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Frage 60
Antworten
-
TTP certifies trustworthiness of binding public key with its rightful owner’s identity
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Frage 61
Antworten
-
Trusted third party authentication system and makes no use of public key cryptography
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Frage 62
Frage
Which of the following does not refer for Kerberos property
Frage 63
Frage
What is a security?
Antworten
-
The protection of information assets through the use of technology, processes, and training
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
-
Ensures that computer-related assets are accessed only by authorized parties
Frage 64
Frage
What is a vulnerability?
Antworten
-
The protection of information assets through the use of technology, processes, and training
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attack
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
-
Ensures that computer-related assets are accessed only by authorized parties
Frage 65
Antworten
-
The protection of information assets through the use of technology, processes, and training
-
Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks.
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
Frage 66
Antworten
-
Interception, Interruption, Modification, Fabrication
-
Method, Opportunity, Motive
-
Confidentiality, Integrity, Availability, Authentication
-
Non-repudiation, Authorisation/Access control, Destruction
Frage 67
Antworten
-
Encryption, Software control, Hardware control, Policies and Procedures,Physical control
-
Method, Opportunity, Motive
-
Confidentiality, Integrity, Availability, Authentication
-
Non-repudiation, Authorisation/Access control, Destruction
Frage 68
Antworten
-
Asset lost, unusable,unavailable
-
Unauthorized access
-
Unauthorized change, tamper of data
-
Ex. Unauthorized add data to a DB
Frage 69
Frage
Security goals are:
Frage 70
Frage
Confidentiality means
Antworten
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Frage 71
Antworten
-
Punishment makes attackers think twice –Examples include laws and organisational policy
-
Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
-
Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
-
Punishment by taking money
Frage 72
Antworten
-
Punishment makes attackers think twice –Examples include laws and organisational policy
-
Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
-
Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
-
Punishment by taking money
Frage 73
Antworten
-
Punishment makes attackers think twice –Examples include laws and organisational policy
-
Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
-
Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
-
Punishment by taking money
Frage 74
Antworten
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Frage 75
Frage
Authentication means
Antworten
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Frage 76
Frage
Non-repudiation means
Antworten
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
ensures that parties cannot deny having sent messages
Frage 77
Antworten
-
Demand Encryption Standard
-
Data Encryption Standard
-
Digital Encryption Standard
-
Database Encryption Standard
Frage 78
Frage 79
Frage
Who introduced idea of substitution-permutation (S-P) networks?
Antworten
-
Shannon
-
Feistal
-
Lucifer
-
Rijndael
Frage 80
Frage
In how many rounds DES encryption is handled?
Frage 81
Frage
_____ process messages in blocks, each of which is then encrypted/decrypted?
Antworten
-
block ciphers
-
stream ciphers
-
mode ciphers
-
code ciphers
Frage 82
Frage
What is the cryptography?
Antworten
-
study about how hacker should behave
-
study of encryption principles/methods
-
study about message transformation
-
study of the computer system
Frage 83
Frage
Which cipher is described below: “Each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.”
Antworten
-
Playfair Cipher
-
Vigenere Cipher
-
Caesar Cipher
-
Kerberos
Frage 84
Frage
How Cryptography is divided by the way in which plaintext is processed:
Frage 85
Frage
What is the Key Matrix size in Playfair
Frage 86
Frage
Using the Caesar cipher decrypt this message “Vwdb kxqjub, vwdb irrolvk” (key=2)
Frage 87
Frage
3 Ds of Security: (DDD)
Antworten
-
Defence, Deterrence, Detection
-
Data, Development, Device
-
Database, Data, Deadline
-
Demand, Design, Decision
Frage 88
Frage
MOM stands for ____
Antworten
-
Method, Opportunity, Motive
-
Modification, Operation, Motto
-
Malfunction, Opinion, Management
-
Messages, Opportunity, Monitoring
Frage 89
Frage
DES is a symmetric cipher
Frage 90
Antworten
-
256-bits
-
128-bits
-
64-bits
-
32-bits
Frage 91
Antworten
-
Advanced Encryption Standard
-
Advanced Encryption System
-
American Encryption Standard
-
Alias Encryption Standard
Frage 92
Frage
Advanced Encryption Standard(AES) also known like
Frage 93
Frage
Who introduce idea of substitution-permutation?
Antworten
-
David Shannon
-
Andre Shannon
-
Petre Shannon
-
Claude Shannon
Frage 94
Frage
In which year was introduced idea of substitution-permutation?
Frage 95
Frage
What is the plaintext?
Frage 96
Frage
What is not the model of the symmetric cipher?
Antworten
-
conventional / private-key / single-key
-
sender and recipient share a common key
-
all classical encryption algorithms are private-key
-
was only type prior to invention of public- key in 1982’s
Frage 97
Frage
What is the Cipher ?
Frage 98
Frage
What is the cryptanalysis (codebreaking ) ?
Antworten
-
algorithm for transforming plaintext to cipher text
-
study of principles/methods of deciphering cipher text without knowing key
-
original message
-
study of encryption principles/methods
Frage 99
Frage
What is the cryptology?
Antworten
-
field of both cryptography & cryptanalysis
-
original message
-
study of encryption principles/methods
-
algorithm for transforming plaintext to cipher text
Frage 100
Frage
What are the general approaches for Cryptanalysis?
Antworten
-
cryptanalytic attack/brute force attack
-
substitution/transposition
-
permutation/transposition
-
substitution/permutation
Frage 101
Frage
What is Ciphertext only?
Antworten
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
Frage 102
Frage
How many types of threats exist?
Frage 103
Frage
Authorisation means
Antworten
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
defining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Frage 104
Antworten
-
Confidentiality, invalid, availability
-
Confidentiality, interact, access
-
Certain, integrity,availability
-
Confidentiality, integrity, availability
Frage 105
Antworten
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks. A weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage
-
Typical threats include unauthorised access, destruction, system overrun and takeover, propagation of malicious code, data thieving and fabrication;
-
Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
Frage 106
Frage
What is ciphertext?
Frage 107
Antworten
-
converting plaintext to ciphertext
-
recovering ciphertext from
-
info used in cipher known only to sender/receiver
-
algorithm for transforming plaintext to ciphertext
Frage 108
Frage
What is encipher (encrypt)?
Antworten
-
study of encryption principles/methods
-
study of principles/ methods of deciphering ciphertext without knowing key
-
original message
-
converting plaintext to ciphertext
Frage 109
Frage
What is decipher (decrypt)?
Antworten
-
converting plaintext to ciphertext
-
recovering ciphertext from plaintext
-
coded message
-
original message
-
recovering plaintext from ciphertext
Frage 110
Frage
Mostly used symmetric cipher
Frage 111
Frage
Possible length of AES key
Antworten
-
128 156 198
-
128 192 256
-
128 184 228
-
128 164 256
Frage 112
Frage
How many stages has final round of AES?
Frage 113
Frage 114
Frage
What is TRUE about RSA? Each user generates a public/private key pair by:
Antworten
-
selecting two large primes at random: p, q
-
selecting two small primes at random: p, q
-
selecting three large primes at random: p, q, r
-
selecting only one number at random: p
Frage 115
Frage
In RSA security relies on a ___ difference in difficulty between ___ (en/decrypt) and ___ (cryptanalyse) problems
Antworten
-
large enough, easy, hard
-
small enough, hard, easy
-
small enough, easy, hard
-
large enough, hard, easy
Frage 116
Frage
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Antworten
-
Data Size
-
Round Size
-
Key Size
-
Encryption Size
Frage 117
Frage
_______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
Frage 118
Frage
In asymmetric key cryptography, the private key is kept by
Frage 119
Frage
RSA was developed by:
Antworten
-
Dr.Tahir El-Gamal
-
Diffie-Hellman
-
Shannon
-
Rivest, Shamir, Adleman
Frage 120
Frage
Encryption by receiver with sender’s public key:
Antworten
-
C = Me mod N
-
M=Cd mod N
-
Ya=Xa mod Q
-
C=Km mod Q
Frage 121
Frage
RSA was founded in:
Frage 122
Frage
Decryption by sender with sender’s public key:
Antworten
-
C=Me mod N
-
M=Cd mod N
-
Ya=Xa mod Q
-
C=Km mod Q
Frage 123
Frage
Calculate n and φ, if p = 3, and q = 11 (RSA)
Antworten
-
n = 33, φ = 20
-
n = 20, φ = 33
-
n = 33, φ = 33
-
n = 33, φ = 22
Frage 124
Frage
Calculate n and φ, if p = 17, and q = 11 (RSA)
Antworten
-
n = 187, φ = 160
-
n = 160, φ = 187
-
n = 187, φ = 187
-
n = 187, φ = 170
Frage 125
Frage
Calculate C (ciphertext), if p = 3, q = 11, e = 7, M = 2 (RSA)
Antworten
-
C = 29
-
C = 3
-
C = 22
-
C = 2
Frage 126
Frage
Calculate M (plaintext), if p = 3, q = 11, d = 3, C = 29 (RSA)
Antworten
-
M = 2
-
M = 29
-
M = 30
-
M = 1
Frage 127
Frage
Block size of AES plaintext:
Frage 128
Frage
Maximum AES number of rounds:
Frage 129
Frage
AES size of output(output parameter):
Frage 130
Frage
First public-key type scheme proposed by Diffie & Hellman in
Frage 131
Frage
Value of key depends on the: (Diffie & Hellman)
Antworten
-
Participants
-
Keys
-
Message
-
Algorithm
Frage 132
Frage
If Alice and Bob subsequently communicate, they will have the____ key
Antworten
-
Same
-
Different
-
Private
-
Public
Frage 133
Frage
Which of these are true about “a public-key distribution scheme ”?
Antworten
-
cannot be used to exchange an arbitrary message
-
rather it can establish a common key
-
known only to the two participants
-
all of above
Frage 134
Frage
When by Diffie & Hellman along with the exposition of public key concepts?
Antworten
-
1977
-
1978
-
1979
-
none of them
Frage 135
Frage
Which of them uses two keys( public and private):
Antworten
-
RSA
-
Caesar
-
Vigenere
-
Playfair
Frage 136
Frage
A related private-key, known
Antworten
-
only to the recipient
-
only to the sender
-
none of them
-
to everyone
Frage 137
Frage
The key must be kept secret for
Frage 138
Frage
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
Antworten
-
man-in-the-middle
-
ciphertext attack
-
plaintext attack
-
none of the above
Frage 139
Frage
“Using only a subset of letters/words in a longer message marked in some way ” is__
Antworten
-
Caesar Cipher
-
RSA
-
DES
-
Steganography
Frage 140
Frage
For which cipher an example is given: “Say hi to IITU” After encrypt “Yas ih ot UTII”
Antworten
-
Playfair Cipher
-
Transposition Cipher
-
Route Cipher
-
Steganography
Frage 141
Frage
Polyalphabetic substitution ciphers improve security using multiple cipher alphabets
Frage 142
Frage
For RSA to work, value of P must be less than value of:
Frage 143
Frage
In symmetric key cryptography, key used by sender and receiver is:
Antworten
-
shаrеd
-
Different
-
Two keys are used
-
None
Frage 144
Frage
In symmetric-key cryptography, same key is used by:
Antworten
-
One Party
-
Multi Party
-
Third Party
-
Both Party
Frage 145
Antworten
-
Rivеst, Shаmir,, Аdlеmаn
-
Roger, Shamir, Adrian
-
Robert, Shamir, Anthoney
-
Rivest, Shaw, Adleman
Frage 146
Frage
Which of them is first public-key type scheme?
Antworten
-
Diffiе & Hеllmаn
-
Elgamal
-
RSA
-
AES
Frage 147
Frage
When Diffie & Hellman protocol was invented?
Frage 148
Frage
In Diffie & Hellman key exchange a public key is known only to the two participants
Frage 149
Frage
In Diffie & Hellman key exchange a public key is cannot be used to exchange an arbitrary message
Frage 150
Frage
Diffie & Hellman key exchange based on exponentiation in a finite (Galois) fields
Frage 151
Frage
In Diffie & Hellman protocol when the user A generates their key a secret key should be
Antworten
-
XА < q
-
generated randomly
-
given by user B
-
none
Frage 152
Frage
Choose the correct formula for computing public key YA in Diffie & Hellman protocol
Antworten
-
YА= а mod q
-
BA = a + b
-
CA = a – b
-
DA = a * b
Frage 153
Frage
Choose the correct formula for computing secret key K by user A in Diffie & Hellman protocol
Antworten
-
K = (YА)^X А mod q
-
S = a + b
-
D = a * b
-
L = a * b + 2
Frage 154
Frage
Elgamal cryptography uses exponentiation in a finite (Galois) fields
Frage 155
Frage
In the Elgamal cryptography when the user A generates their key a secret key should be
Antworten
-
1 < XА < q-1
-
generated randomly
-
given by user
-
none
Frage 156
Frage
Choose the correct formula for computing public key YA in Elgamal cryptography
Antworten
-
YА = аXА mod q
-
K = YАk mod q
-
K = (YА)^X А mod q
-
YА= а mod q
Frage 157
Frage
Choose the correct formula for computing one-time key K in Elgamal cryptography
Antworten
-
K = YАk mod q
-
S = a + b + 1
-
D = a * b + 2
-
L = a * b + 3
Frage 158
Frage
Choose the correct formula for computing C1 in Elgamal cryptography
Antworten
-
C1 = аk mod q
-
C3 = a mod b
-
C = z + 2 + 5
-
C5 = a * b +2
Frage 159
Frage
Choose the correct formula for computing C2 in Elgamal cryptography
Antworten
-
C2 = KM mod q
-
C = MK
-
C3 = AK
-
C4 = AA
Frage 160
Frage
In Elgamal cryptography public key cryptosystem related to D-H
Frage 161
Frage
Known plaintext is...
Antworten
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
Attacker selects plaintext or ciphertext to en/decrypt
Frage 162
Frage
Chosen plaintext is...
Antworten
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
Attacker selects plaintext or ciphertext to en/decrypt
Frage 163
Frage
Chosen ciphertext is...
Antworten
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
Attacker selects plaintext or ciphertext to en/decrypt
Frage 164
Antworten
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
attacker selects plaintext or ciphertext to en/decrypt