Questão 1
Questão
What is the purpose of access control list?
Responda
-
to enforce a specified security policy
-
to prevent unauthorised access to data
-
to emphasize encryption
-
it is a key distribution center
Questão 2
Questão
Identify definition of authentication
Responda
-
establishes the identity of a subject
-
specifies and enforces that each object is accessed correctly and only by those that are allowed to do so
-
to enforce a specified security policy
-
to emphasize encryption
Questão 3
Questão
What does Access Control Information cover?
Questão 4
Questão
What does Access Control Enforcement cover?
Questão 5
Questão
What does Access Control Decision Function cover?
Questão 6
Questão
Define a subject of Access Control List
Responda
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Questão 7
Questão
Define an object of Access Control List
Responda
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Questão 8
Questão
How many types of resource dependent access controls exist?
Questão 9
Questão
How many types of access control mechanisms exist
Questão 10
Questão
Find an example of resource dependent access for network access
Responda
-
append
-
execute
-
redirected
-
granted
Questão 11
Questão
Find an example of resource dependent access for file access
Responda
-
append
-
execute
-
redirected
-
granted
Questão 12
Questão
Find incorrect access control goal
Responda
-
invalid operations should be permitted
-
every actions should be checked
-
unnecessary access should not be allowed
-
all the above mentioned
Questão 13
Questão
What is a property of the capability ticket in access control list?
Responda
-
Specifies a given subject can perform what operations on what objects
-
Subjects does not grant rights to other subjects
-
Users have only one ticket
-
Access rights given to a subject are valid for forever
Questão 14
Questão
What is a property of the procedure oriented objects in access control list?
Responda
-
Objects are encapsulated, permitting only certain specified accesses via program execution
-
Specifies a given subject can perform what operations on what objects
-
Access rights given to a subject are valid for forever
-
Users have only one ticket
Questão 15
Questão
What is a property of the procedure oriented objects in access control list?
Responda
-
Enforces accesses to an object be done through a trusted interface
-
Specifies a given subject can perform what operations on what objects
-
Access rights given to a subject are valid for forever
-
Users have only one ticket
Questão 16
Questão
What does multilevel security mean?
Responda
-
Classification of information by the level of importance and permission of access by users with different security clearance
-
Classification of information by date and permission of access by users with different security clearance
-
Classification of information by the level of importance and permission of access by users name
-
Classification of information by date and permission of access by users name
Questão 17
Questão
How many levels are covered in multilevel security
Questão 18
Questão
No read up (read down) means
Responda
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Questão 19
Questão
No write down (write up) means
Responda
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Questão 20
Questão
Define a malware attacks
Responda
-
Malicious software causes data compromises
-
A browser helper object that detects changes to URL and logs
-
Users are tricked by fraudulent messages into giving out information
-
The lookup of host names is altered to send users to a fraudulent server
Questão 21
Questão
How many types of authentication schemes exist?
Questão 22
Questão
Define a change cipher spec
Responda
-
All data sent/received by software that uses SSL
-
used to carry handshake messages
-
used to indicates a change in the encryption and authentication of records
-
used to indicate when the connection is about to close
Questão 23
Responda
-
All data sent/received by software that uses SSL
-
used to carry handshake messages
-
used to indicates a change in the encryption and authentication of records
-
used to indicate when the connection is about to close
Questão 24
Questão
Which of the following is true about importance of hash functions i. High Computational Load ii. Message Overhead iii. Security Limitations
Responda
-
i only
-
none
-
All the mentioned
-
iii only
Questão 25
Questão
What does “computationally infeasible to find data mapping to specific hash” mean
Responda
-
One way property
-
Collision free property
-
Second way property
-
Collision property
Questão 26
Questão
Which of the following is not property of hash functions?
Questão 27
Questão
How many types of hash constructions exist?
Questão 28
Questão
Output length for SHA-1
Questão 29
Questão
Input length for SHA-1
Questão 30
Questão
Which construction method support SHA?
Responda
-
Schnorr
-
Diffie-Hellman
-
Merkle-Damgard
-
Alice & Bob
Questão 31
Questão
How many rounds in general hold SHA-1?
Questão 32
Questão
How many stages hold SHA-1?
Questão 33
Questão
How many rounds support one stage?
Questão 34
Questão
Name of the function that SHA-1 use
Responda
-
Merkle-Damgard
-
Feistel
-
Schnorr
-
Diffie-Hellman
Questão 35
Questão
How many types of SHA exist ?
Questão 36
Questão
How many rounds MD5 hold in general?
Questão 37
Questão
Which of the following does not refer to security requirements of Hash functions?
Questão 38
Questão
The purpose of hash function is to
Responda
-
Create a message
-
Compress a message
-
Divide a message
-
Conquer a message
Questão 39
Questão
How many constant keys support SHA algorithm ?
Questão 40
Questão
Which of the following refers requirement of digital signature?
Responda
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be computationally infeasible to forge
Questão 41
Questão
Which of the following refers requirement of digital signature?
Responda
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be practical to save digital signature in storage
Questão 42
Questão
What is the property of direct digital signature?
Responda
-
Assumed receiver has sender’s private key
-
Involves only sender
-
Can encrypt using receiver’s public key
-
Assumed sender has receiver’s private key
Questão 43
Questão
Which of the following does not refer to characteristics of digital signature?
Responda
-
Private/public is generated by receiver
-
A durable private/public key pair
-
A disposable private/public key pair
-
Signature is two numbers, depending on message hash and secret information
Questão 44
Questão
How many message authentication functions exist?
Questão 45
Questão
If public key encryption is used
Responda
-
Encryption provides no confidence of sender
-
Encryption provides with some level of confidence of sender
-
Encryption provides fully confidence of sender
-
Encryption does not provided at all
Questão 46
Questão
In public key cryptography sender signs message using their
Responda
-
Public key
-
Shared key
-
Private key
-
Third key
Questão 47
Questão
In public key cryptography sender signs message using their private key, then encrypts with recipient’s
Responda
-
Private key
-
Public key
-
Single key
-
Key
Questão 48
Questão
What is authentication?
Questão 49
Questão
Define AAA.(triple A)
Responda
-
Access After Anyone
-
Authentication Authorization Accounting
-
Authentication Authorization Access
-
Authentication Access Accounting
Questão 50
Questão
Which of the term refers to authorization?
Responda
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
-
Accounting of service
Questão 51
Questão
Which of the term refers to accounting?
Responda
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
-
Accounting of service
Questão 52
Questão
PIN, passwords refer to
Responda
-
Something you have
-
Something you know
-
Something you are
-
Combined method
Questão 53
Questão
Keys, soft tokens refer to
Responda
-
Something you have
-
Something you know
-
Something you are
-
Combined method
Questão 54
Questão
Fingerprint, iris, palm recognition refer to
Responda
-
Something you have
-
Something you know
-
Something you are
-
Combined method
Questão 55
Questão
Combined or multiple methods of authentication are used for
Responda
-
Lower level assurance
-
Medium level assurance
-
Higher level assurance
-
Not used at all
Questão 56
Questão
How many phases are exist in biometric?
Questão 57
Questão
When fingerprint was developed?
Questão 58
Questão
What is minutia ?
Questão 59
Responda
-
TTP certifies trustworthiness of binding public key with its rightful owner’s identity
-
TTP certifies trustworthiness of binding private key with its rightful owner’s
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Questão 60
Responda
-
TTP certifies trustworthiness of binding public key with its rightful owner’s identity
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Questão 61
Questão
Define a Kerberos
Responda
-
Trusted third party authentication system and makes no use of public key cryptography
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Questão 62
Questão
Which of the following does not refer for Kerberos property
Questão 63
Questão
What is a security?
Responda
-
The protection of information assets through the use of technology, processes, and training
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
-
Ensures that computer-related assets are accessed only by authorized parties
Questão 64
Questão
What is a vulnerability?
Responda
-
The protection of information assets through the use of technology, processes, and training
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attack
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
-
Ensures that computer-related assets are accessed only by authorized parties
Questão 65
Questão
What is an attack?
Responda
-
The protection of information assets through the use of technology, processes, and training
-
Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks.
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
Questão 66
Responda
-
Interception, Interruption, Modification, Fabrication
-
Method, Opportunity, Motive
-
Confidentiality, Integrity, Availability, Authentication
-
Non-repudiation, Authorisation/Access control, Destruction
Questão 67
Responda
-
Encryption, Software control, Hardware control, Policies and Procedures,Physical control
-
Method, Opportunity, Motive
-
Confidentiality, Integrity, Availability, Authentication
-
Non-repudiation, Authorisation/Access control, Destruction
Questão 68
Questão
Interception is __
Responda
-
Asset lost, unusable,unavailable
-
Unauthorized access
-
Unauthorized change, tamper of data
-
Ex. Unauthorized add data to a DB
Questão 69
Questão
Security goals are:
Questão 70
Questão
Confidentiality means
Responda
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Questão 71
Responda
-
Punishment makes attackers think twice –Examples include laws and organisational policy
-
Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
-
Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
-
Punishment by taking money
Questão 72
Responda
-
Punishment makes attackers think twice –Examples include laws and organisational policy
-
Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
-
Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
-
Punishment by taking money
Questão 73
Responda
-
Punishment makes attackers think twice –Examples include laws and organisational policy
-
Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
-
Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
-
Punishment by taking money
Questão 74
Responda
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Questão 75
Questão
Authentication means
Responda
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Questão 76
Questão
Non-repudiation means
Responda
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
ensures that parties cannot deny having sent messages
Questão 77
Responda
-
Demand Encryption Standard
-
Data Encryption Standard
-
Digital Encryption Standard
-
Database Encryption Standard
Questão 78
Questão
When DES released?
Questão 79
Questão
Who introduced idea of substitution-permutation (S-P) networks?
Responda
-
Shannon
-
Feistal
-
Lucifer
-
Rijndael
Questão 80
Questão
In how many rounds DES encryption is handled?
Questão 81
Questão
_____ process messages in blocks, each of which is then encrypted/decrypted?
Responda
-
block ciphers
-
stream ciphers
-
mode ciphers
-
code ciphers
Questão 82
Questão
What is the cryptography?
Responda
-
study about how hacker should behave
-
study of encryption principles/methods
-
study about message transformation
-
study of the computer system
Questão 83
Questão
Which cipher is described below: “Each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.”
Responda
-
Playfair Cipher
-
Vigenere Cipher
-
Caesar Cipher
-
Kerberos
Questão 84
Questão
How Cryptography is divided by the way in which plaintext is processed:
Questão 85
Questão
What is the Key Matrix size in Playfair
Questão 86
Questão
Using the Caesar cipher decrypt this message “Vwdb kxqjub, vwdb irrolvk” (key=2)
Questão 87
Questão
3 Ds of Security: (DDD)
Responda
-
Defence, Deterrence, Detection
-
Data, Development, Device
-
Database, Data, Deadline
-
Demand, Design, Decision
Questão 88
Questão
MOM stands for ____
Responda
-
Method, Opportunity, Motive
-
Modification, Operation, Motto
-
Malfunction, Opinion, Management
-
Messages, Opportunity, Monitoring
Questão 89
Questão
DES is a symmetric cipher
Questão 90
Questão
Block size of DES
Responda
-
256-bits
-
128-bits
-
64-bits
-
32-bits
Questão 91
Responda
-
Advanced Encryption Standard
-
Advanced Encryption System
-
American Encryption Standard
-
Alias Encryption Standard
Questão 92
Questão
Advanced Encryption Standard(AES) also known like
Questão 93
Questão
Who introduce idea of substitution-permutation?
Responda
-
David Shannon
-
Andre Shannon
-
Petre Shannon
-
Claude Shannon
Questão 94
Questão
In which year was introduced idea of substitution-permutation?
Questão 95
Questão
What is the plaintext?
Questão 96
Questão
What is not the model of the symmetric cipher?
Responda
-
conventional / private-key / single-key
-
sender and recipient share a common key
-
all classical encryption algorithms are private-key
-
was only type prior to invention of public- key in 1982’s
Questão 97
Questão
What is the Cipher ?
Questão 98
Questão
What is the cryptanalysis (codebreaking ) ?
Responda
-
algorithm for transforming plaintext to cipher text
-
study of principles/methods of deciphering cipher text without knowing key
-
original message
-
study of encryption principles/methods
Questão 99
Questão
What is the cryptology?
Responda
-
field of both cryptography & cryptanalysis
-
original message
-
study of encryption principles/methods
-
algorithm for transforming plaintext to cipher text
Questão 100
Questão
What are the general approaches for Cryptanalysis?
Responda
-
cryptanalytic attack/brute force attack
-
substitution/transposition
-
permutation/transposition
-
substitution/permutation
Questão 101
Questão
What is Ciphertext only?
Responda
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
Questão 102
Questão
How many types of threats exist?
Questão 103
Questão
Authorisation means
Responda
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
defining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Questão 104
Responda
-
Confidentiality, invalid, availability
-
Confidentiality, interact, access
-
Certain, integrity,availability
-
Confidentiality, integrity, availability
Questão 105
Responda
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks. A weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage
-
Typical threats include unauthorised access, destruction, system overrun and takeover, propagation of malicious code, data thieving and fabrication;
-
Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
Questão 106
Questão
What is ciphertext?
Questão 107
Responda
-
converting plaintext to ciphertext
-
recovering ciphertext from
-
info used in cipher known only to sender/receiver
-
algorithm for transforming plaintext to ciphertext
Questão 108
Questão
What is encipher (encrypt)?
Responda
-
study of encryption principles/methods
-
study of principles/ methods of deciphering ciphertext without knowing key
-
original message
-
converting plaintext to ciphertext
Questão 109
Questão
What is decipher (decrypt)?
Responda
-
converting plaintext to ciphertext
-
recovering ciphertext from plaintext
-
coded message
-
original message
-
recovering plaintext from ciphertext
Questão 110
Questão
Mostly used symmetric cipher
Questão 111
Questão
Possible length of AES key
Responda
-
128 156 198
-
128 192 256
-
128 184 228
-
128 164 256
Questão 112
Questão
How many stages has final round of AES?
Questão 113
Questão 114
Questão
What is TRUE about RSA? Each user generates a public/private key pair by:
Responda
-
selecting two large primes at random: p, q
-
selecting two small primes at random: p, q
-
selecting three large primes at random: p, q, r
-
selecting only one number at random: p
Questão 115
Questão
In RSA security relies on a ___ difference in difficulty between ___ (en/decrypt) and ___ (cryptanalyse) problems
Responda
-
large enough, easy, hard
-
small enough, hard, easy
-
small enough, easy, hard
-
large enough, hard, easy
Questão 116
Questão
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Responda
-
Data Size
-
Round Size
-
Key Size
-
Encryption Size
Questão 117
Questão
_______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
Questão 118
Questão
In asymmetric key cryptography, the private key is kept by
Questão 119
Questão
RSA was developed by:
Responda
-
Dr.Tahir El-Gamal
-
Diffie-Hellman
-
Shannon
-
Rivest, Shamir, Adleman
Questão 120
Questão
Encryption by receiver with sender’s public key:
Responda
-
C = Me mod N
-
M=Cd mod N
-
Ya=Xa mod Q
-
C=Km mod Q
Questão 121
Questão
RSA was founded in:
Questão 122
Questão
Decryption by sender with sender’s public key:
Responda
-
C=Me mod N
-
M=Cd mod N
-
Ya=Xa mod Q
-
C=Km mod Q
Questão 123
Questão
Calculate n and φ, if p = 3, and q = 11 (RSA)
Responda
-
n = 33, φ = 20
-
n = 20, φ = 33
-
n = 33, φ = 33
-
n = 33, φ = 22
Questão 124
Questão
Calculate n and φ, if p = 17, and q = 11 (RSA)
Responda
-
n = 187, φ = 160
-
n = 160, φ = 187
-
n = 187, φ = 187
-
n = 187, φ = 170
Questão 125
Questão
Calculate C (ciphertext), if p = 3, q = 11, e = 7, M = 2 (RSA)
Responda
-
C = 29
-
C = 3
-
C = 22
-
C = 2
Questão 126
Questão
Calculate M (plaintext), if p = 3, q = 11, d = 3, C = 29 (RSA)
Responda
-
M = 2
-
M = 29
-
M = 30
-
M = 1
Questão 127
Questão
Block size of AES plaintext:
Questão 128
Questão
Maximum AES number of rounds:
Questão 129
Questão
AES size of output(output parameter):
Questão 130
Questão
First public-key type scheme proposed by Diffie & Hellman in
Questão 131
Questão
Value of key depends on the: (Diffie & Hellman)
Responda
-
Participants
-
Keys
-
Message
-
Algorithm
Questão 132
Questão
If Alice and Bob subsequently communicate, they will have the____ key
Responda
-
Same
-
Different
-
Private
-
Public
Questão 133
Questão
Which of these are true about “a public-key distribution scheme ”?
Responda
-
cannot be used to exchange an arbitrary message
-
rather it can establish a common key
-
known only to the two participants
-
all of above
Questão 134
Questão
When by Diffie & Hellman along with the exposition of public key concepts?
Responda
-
1977
-
1978
-
1979
-
none of them
Questão 135
Questão
Which of them uses two keys( public and private):
Responda
-
RSA
-
Caesar
-
Vigenere
-
Playfair
Questão 136
Questão
A related private-key, known
Responda
-
only to the recipient
-
only to the sender
-
none of them
-
to everyone
Questão 137
Questão
The key must be kept secret for
Questão 138
Questão
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
Responda
-
man-in-the-middle
-
ciphertext attack
-
plaintext attack
-
none of the above
Questão 139
Questão
“Using only a subset of letters/words in a longer message marked in some way ” is__
Responda
-
Caesar Cipher
-
RSA
-
DES
-
Steganography
Questão 140
Questão
For which cipher an example is given: “Say hi to IITU” After encrypt “Yas ih ot UTII”
Responda
-
Playfair Cipher
-
Transposition Cipher
-
Route Cipher
-
Steganography
Questão 141
Questão
Polyalphabetic substitution ciphers improve security using multiple cipher alphabets
Questão 142
Questão
For RSA to work, value of P must be less than value of:
Questão 143
Questão
In symmetric key cryptography, key used by sender and receiver is:
Responda
-
shаrеd
-
Different
-
Two keys are used
-
None
Questão 144
Questão
In symmetric-key cryptography, same key is used by:
Responda
-
One Party
-
Multi Party
-
Third Party
-
Both Party
Questão 145
Responda
-
Rivеst, Shаmir,, Аdlеmаn
-
Roger, Shamir, Adrian
-
Robert, Shamir, Anthoney
-
Rivest, Shaw, Adleman
Questão 146
Questão
Which of them is first public-key type scheme?
Responda
-
Diffiе & Hеllmаn
-
Elgamal
-
RSA
-
AES
Questão 147
Questão
When Diffie & Hellman protocol was invented?
Questão 148
Questão
In Diffie & Hellman key exchange a public key is known only to the two participants
Questão 149
Questão
In Diffie & Hellman key exchange a public key is cannot be used to exchange an arbitrary message
Questão 150
Questão
Diffie & Hellman key exchange based on exponentiation in a finite (Galois) fields
Questão 151
Questão
In Diffie & Hellman protocol when the user A generates their key a secret key should be
Responda
-
XА < q
-
generated randomly
-
given by user B
-
none
Questão 152
Questão
Choose the correct formula for computing public key YA in Diffie & Hellman protocol
Responda
-
YА= а mod q
-
BA = a + b
-
CA = a – b
-
DA = a * b
Questão 153
Questão
Choose the correct formula for computing secret key K by user A in Diffie & Hellman protocol
Responda
-
K = (YА)^X А mod q
-
S = a + b
-
D = a * b
-
L = a * b + 2
Questão 154
Questão
Elgamal cryptography uses exponentiation in a finite (Galois) fields
Questão 155
Questão
In the Elgamal cryptography when the user A generates their key a secret key should be
Responda
-
1 < XА < q-1
-
generated randomly
-
given by user
-
none
Questão 156
Questão
Choose the correct formula for computing public key YA in Elgamal cryptography
Responda
-
YА = аXА mod q
-
K = YАk mod q
-
K = (YА)^X А mod q
-
YА= а mod q
Questão 157
Questão
Choose the correct formula for computing one-time key K in Elgamal cryptography
Responda
-
K = YАk mod q
-
S = a + b + 1
-
D = a * b + 2
-
L = a * b + 3
Questão 158
Questão
Choose the correct formula for computing C1 in Elgamal cryptography
Responda
-
C1 = аk mod q
-
C3 = a mod b
-
C = z + 2 + 5
-
C5 = a * b +2
Questão 159
Questão
Choose the correct formula for computing C2 in Elgamal cryptography
Responda
-
C2 = KM mod q
-
C = MK
-
C3 = AK
-
C4 = AA
Questão 160
Questão
In Elgamal cryptography public key cryptosystem related to D-H
Questão 161
Questão
Known plaintext is...
Responda
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
Attacker selects plaintext or ciphertext to en/decrypt
Questão 162
Questão
Chosen plaintext is...
Responda
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
Attacker selects plaintext or ciphertext to en/decrypt
Questão 163
Questão
Chosen ciphertext is...
Responda
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
Attacker selects plaintext or ciphertext to en/decrypt
Questão 164
Questão
Chosen text is ...
Responda
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
attacker selects plaintext or ciphertext to en/decrypt