Question 1
Question
What is the purpose of access control list?
Answer
-
to enforce a specified security policy
-
to prevent unauthorised access to data
-
to emphasize encryption
-
it is a key distribution center
Question 2
Question
Identify definition of authentication
Answer
-
establishes the identity of a subject
-
specifies and enforces that each object is accessed correctly and only by those that are allowed to do so
-
to enforce a specified security policy
-
to emphasize encryption
Question 3
Question
What does Access Control Information cover?
Question 4
Question
What does Access Control Enforcement cover?
Question 5
Question
What does Access Control Decision Function cover?
Question 6
Question
Define a subject of Access Control List
Answer
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Question 7
Question
Define an object of Access Control List
Answer
-
an active entity requesting for resource access
-
a passive entity and target of the protection
-
an access control decision function
-
an access control information function
Question 8
Question
How many types of resource dependent access controls exist?
Question 9
Question
How many types of access control mechanisms exist
Question 10
Question
Find an example of resource dependent access for network access
Answer
-
append
-
execute
-
redirected
-
granted
Question 11
Question
Find an example of resource dependent access for file access
Answer
-
append
-
execute
-
redirected
-
granted
Question 12
Question
Find incorrect access control goal
Answer
-
invalid operations should be permitted
-
every actions should be checked
-
unnecessary access should not be allowed
-
all the above mentioned
Question 13
Question
What is a property of the capability ticket in access control list?
Answer
-
Specifies a given subject can perform what operations on what objects
-
Subjects does not grant rights to other subjects
-
Users have only one ticket
-
Access rights given to a subject are valid for forever
Question 14
Question
What is a property of the procedure oriented objects in access control list?
Answer
-
Objects are encapsulated, permitting only certain specified accesses via program execution
-
Specifies a given subject can perform what operations on what objects
-
Access rights given to a subject are valid for forever
-
Users have only one ticket
Question 15
Question
What is a property of the procedure oriented objects in access control list?
Answer
-
Enforces accesses to an object be done through a trusted interface
-
Specifies a given subject can perform what operations on what objects
-
Access rights given to a subject are valid for forever
-
Users have only one ticket
Question 16
Question
What does multilevel security mean?
Answer
-
Classification of information by the level of importance and permission of access by users with different security clearance
-
Classification of information by date and permission of access by users with different security clearance
-
Classification of information by the level of importance and permission of access by users name
-
Classification of information by date and permission of access by users name
Question 17
Question
How many levels are covered in multilevel security
Question 18
Question
No read up (read down) means
Answer
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Question 19
Question
No write down (write up) means
Answer
-
A subject can only read an object of less or equal security level
-
A subject can only write into an object of greater or equal security level
-
A subject can only read an object of more or equal security level
-
A subject can only write into an object of less or equal security level
Question 20
Question
Define a malware attacks
Answer
-
Malicious software causes data compromises
-
A browser helper object that detects changes to URL and logs
-
Users are tricked by fraudulent messages into giving out information
-
The lookup of host names is altered to send users to a fraudulent server
Question 21
Question
How many types of authentication schemes exist?
Question 22
Question
Define a change cipher spec
Answer
-
All data sent/received by software that uses SSL
-
used to carry handshake messages
-
used to indicates a change in the encryption and authentication of records
-
used to indicate when the connection is about to close
Question 23
Answer
-
All data sent/received by software that uses SSL
-
used to carry handshake messages
-
used to indicates a change in the encryption and authentication of records
-
used to indicate when the connection is about to close
Question 24
Question
Which of the following is true about importance of hash functions i. High Computational Load ii. Message Overhead iii. Security Limitations
Answer
-
i only
-
none
-
All the mentioned
-
iii only
Question 25
Question
What does “computationally infeasible to find data mapping to specific hash” mean
Answer
-
One way property
-
Collision free property
-
Second way property
-
Collision property
Question 26
Question
Which of the following is not property of hash functions?
Question 27
Question
How many types of hash constructions exist?
Question 28
Question
Output length for SHA-1
Question 29
Question
Input length for SHA-1
Question 30
Question
Which construction method support SHA?
Answer
-
Schnorr
-
Diffie-Hellman
-
Merkle-Damgard
-
Alice & Bob
Question 31
Question
How many rounds in general hold SHA-1?
Question 32
Question
How many stages hold SHA-1?
Question 33
Question
How many rounds support one stage?
Question 34
Question
Name of the function that SHA-1 use
Answer
-
Merkle-Damgard
-
Feistel
-
Schnorr
-
Diffie-Hellman
Question 35
Question
How many types of SHA exist ?
Question 36
Question
How many rounds MD5 hold in general?
Question 37
Question
Which of the following does not refer to security requirements of Hash functions?
Question 38
Question
The purpose of hash function is to
Answer
-
Create a message
-
Compress a message
-
Divide a message
-
Conquer a message
Question 39
Question
How many constant keys support SHA algorithm ?
Question 40
Question
Which of the following refers requirement of digital signature?
Answer
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be computationally infeasible to forge
Question 41
Question
Which of the following refers requirement of digital signature?
Answer
-
Must be relatively hard to produce
-
Must be relatively hard to recognize
-
Must depend on the message verified
-
Must to be practical to save digital signature in storage
Question 42
Question
What is the property of direct digital signature?
Answer
-
Assumed receiver has sender’s private key
-
Involves only sender
-
Can encrypt using receiver’s public key
-
Assumed sender has receiver’s private key
Question 43
Question
Which of the following does not refer to characteristics of digital signature?
Answer
-
Private/public is generated by receiver
-
A durable private/public key pair
-
A disposable private/public key pair
-
Signature is two numbers, depending on message hash and secret information
Question 44
Question
How many message authentication functions exist?
Question 45
Question
If public key encryption is used
Answer
-
Encryption provides no confidence of sender
-
Encryption provides with some level of confidence of sender
-
Encryption provides fully confidence of sender
-
Encryption does not provided at all
Question 46
Question
In public key cryptography sender signs message using their
Answer
-
Public key
-
Shared key
-
Private key
-
Third key
Question 47
Question
In public key cryptography sender signs message using their private key, then encrypts with recipient’s
Answer
-
Private key
-
Public key
-
Single key
-
Key
Question 48
Question
What is authentication?
Question 49
Question
Define AAA.(triple A)
Answer
-
Access After Anyone
-
Authentication Authorization Accounting
-
Authentication Authorization Access
-
Authentication Access Accounting
Question 50
Question
Which of the term refers to authorization?
Answer
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
-
Accounting of service
Question 51
Question
Which of the term refers to accounting?
Answer
-
The user identity is a parameter in access control decisions
-
The user identity is recorded when logging security
-
The process of verifying a claimed identity
-
Accounting of service
Question 52
Question
PIN, passwords refer to
Answer
-
Something you have
-
Something you know
-
Something you are
-
Combined method
Question 53
Question
Keys, soft tokens refer to
Answer
-
Something you have
-
Something you know
-
Something you are
-
Combined method
Question 54
Question
Fingerprint, iris, palm recognition refer to
Answer
-
Something you have
-
Something you know
-
Something you are
-
Combined method
Question 55
Question
Combined or multiple methods of authentication are used for
Answer
-
Lower level assurance
-
Medium level assurance
-
Higher level assurance
-
Not used at all
Question 56
Question
How many phases are exist in biometric?
Question 57
Question
When fingerprint was developed?
Question 58
Question
What is minutia ?
Question 59
Answer
-
TTP certifies trustworthiness of binding public key with its rightful owner’s identity
-
TTP certifies trustworthiness of binding private key with its rightful owner’s
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Question 60
Answer
-
TTP certifies trustworthiness of binding public key with its rightful owner’s identity
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Question 61
Question
Define a Kerberos
Answer
-
Trusted third party authentication system and makes no use of public key cryptography
-
TTP certifies trustworthiness of binding private key with its rightful owner’s identity
-
To enable the validation and to give legal meaning to digital signature
-
Answers for supporting encryption/decryption algorithms
Question 62
Question
Which of the following does not refer for Kerberos property
Question 63
Question
What is a security?
Answer
-
The protection of information assets through the use of technology, processes, and training
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
-
Ensures that computer-related assets are accessed only by authorized parties
Question 64
Question
What is a vulnerability?
Answer
-
The protection of information assets through the use of technology, processes, and training
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attack
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
-
Ensures that computer-related assets are accessed only by authorized parties
Question 65
Question
What is an attack?
Answer
-
The protection of information assets through the use of technology, processes, and training
-
Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks.
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
Question 66
Question
Types of Threats
Answer
-
Interception, Interruption, Modification, Fabrication
-
Method, Opportunity, Motive
-
Confidentiality, Integrity, Availability, Authentication
-
Non-repudiation, Authorisation/Access control, Destruction
Question 67
Answer
-
Encryption, Software control, Hardware control, Policies and Procedures,Physical control
-
Method, Opportunity, Motive
-
Confidentiality, Integrity, Availability, Authentication
-
Non-repudiation, Authorisation/Access control, Destruction
Question 68
Question
Interception is __
Answer
-
Asset lost, unusable,unavailable
-
Unauthorized access
-
Unauthorized change, tamper of data
-
Ex. Unauthorized add data to a DB
Question 69
Question
Security goals are:
Question 70
Question
Confidentiality means
Answer
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Question 71
Answer
-
Punishment makes attackers think twice –Examples include laws and organisational policy
-
Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
-
Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
-
Punishment by taking money
Question 72
Answer
-
Punishment makes attackers think twice –Examples include laws and organisational policy
-
Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
-
Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
-
Punishment by taking money
Question 73
Answer
-
Punishment makes attackers think twice –Examples include laws and organisational policy
-
Reduce likelihood and save cost of incidents ◦ ( Ex.: Firewalls, router access control list, spam filters, virus scanners)
-
Need alert if breach occurs –Collection of evidence ◦ ( ex.: Audit logs, intrusion detection system, network traffic monitoring)
-
Punishment by taking money
Question 74
Answer
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Question 75
Question
Authentication means
Answer
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Question 76
Question
Non-repudiation means
Answer
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
determining the identity of entities involved in message exchanges
-
ensures that parties cannot deny having sent messages
Question 77
Answer
-
Demand Encryption Standard
-
Data Encryption Standard
-
Digital Encryption Standard
-
Database Encryption Standard
Question 78
Question
When DES released?
Question 79
Question
Who introduced idea of substitution-permutation (S-P) networks?
Answer
-
Shannon
-
Feistal
-
Lucifer
-
Rijndael
Question 80
Question
In how many rounds DES encryption is handled?
Question 81
Question
_____ process messages in blocks, each of which is then encrypted/decrypted?
Answer
-
block ciphers
-
stream ciphers
-
mode ciphers
-
code ciphers
Question 82
Question
What is the cryptography?
Answer
-
study about how hacker should behave
-
study of encryption principles/methods
-
study about message transformation
-
study of the computer system
Question 83
Question
Which cipher is described below: “Each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.”
Answer
-
Playfair Cipher
-
Vigenere Cipher
-
Caesar Cipher
-
Kerberos
Question 84
Question
How Cryptography is divided by the way in which plaintext is processed:
Question 85
Question
What is the Key Matrix size in Playfair
Question 86
Question
Using the Caesar cipher decrypt this message “Vwdb kxqjub, vwdb irrolvk” (key=2)
Question 87
Question
3 Ds of Security: (DDD)
Answer
-
Defence, Deterrence, Detection
-
Data, Development, Device
-
Database, Data, Deadline
-
Demand, Design, Decision
Question 88
Question
MOM stands for ____
Answer
-
Method, Opportunity, Motive
-
Modification, Operation, Motto
-
Malfunction, Opinion, Management
-
Messages, Opportunity, Monitoring
Question 89
Question
DES is a symmetric cipher
Question 90
Question
Block size of DES
Answer
-
256-bits
-
128-bits
-
64-bits
-
32-bits
Question 91
Answer
-
Advanced Encryption Standard
-
Advanced Encryption System
-
American Encryption Standard
-
Alias Encryption Standard
Question 92
Question
Advanced Encryption Standard(AES) also known like
Question 93
Question
Who introduce idea of substitution-permutation?
Answer
-
David Shannon
-
Andre Shannon
-
Petre Shannon
-
Claude Shannon
Question 94
Question
In which year was introduced idea of substitution-permutation?
Question 95
Question
What is the plaintext?
Question 96
Question
What is not the model of the symmetric cipher?
Answer
-
conventional / private-key / single-key
-
sender and recipient share a common key
-
all classical encryption algorithms are private-key
-
was only type prior to invention of public- key in 1982’s
Question 97
Question
What is the Cipher ?
Question 98
Question
What is the cryptanalysis (codebreaking ) ?
Answer
-
algorithm for transforming plaintext to cipher text
-
study of principles/methods of deciphering cipher text without knowing key
-
original message
-
study of encryption principles/methods
Question 99
Question
What is the cryptology?
Answer
-
field of both cryptography & cryptanalysis
-
original message
-
study of encryption principles/methods
-
algorithm for transforming plaintext to cipher text
Question 100
Question
What are the general approaches for Cryptanalysis?
Answer
-
cryptanalytic attack/brute force attack
-
substitution/transposition
-
permutation/transposition
-
substitution/permutation
Question 101
Question
What is Ciphertext only?
Answer
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
Question 102
Question
How many types of threats exist?
Question 103
Question
Authorisation means
Answer
-
messages exchanged across network remains private
-
contents of messages are not modified while in transit
-
defining the identity of entities involved in message exchanges
-
determining the resources that an entities are allowed to access and in what manner
Question 104
Answer
-
Confidentiality, invalid, availability
-
Confidentiality, interact, access
-
Certain, integrity,availability
-
Confidentiality, integrity, availability
Question 105
Answer
-
The presence of weaknesses or loopholes in systems which may lead (systematically) to cyber attacks. A weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage
-
Typical threats include unauthorised access, destruction, system overrun and takeover, propagation of malicious code, data thieving and fabrication;
-
Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer
-
Occurs when a system is compromised based on a vulnerability by an unknown exploit
Question 106
Question
What is ciphertext?
Question 107
Answer
-
converting plaintext to ciphertext
-
recovering ciphertext from
-
info used in cipher known only to sender/receiver
-
algorithm for transforming plaintext to ciphertext
Question 108
Question
What is encipher (encrypt)?
Answer
-
study of encryption principles/methods
-
study of principles/ methods of deciphering ciphertext without knowing key
-
original message
-
converting plaintext to ciphertext
Question 109
Question
What is decipher (decrypt)?
Answer
-
converting plaintext to ciphertext
-
recovering ciphertext from plaintext
-
coded message
-
original message
-
recovering plaintext from ciphertext
Question 110
Question
Mostly used symmetric cipher
Question 111
Question
Possible length of AES key
Answer
-
128 156 198
-
128 192 256
-
128 184 228
-
128 164 256
Question 112
Question
How many stages has final round of AES?
Question 113
Question 114
Question
What is TRUE about RSA? Each user generates a public/private key pair by:
Answer
-
selecting two large primes at random: p, q
-
selecting two small primes at random: p, q
-
selecting three large primes at random: p, q, r
-
selecting only one number at random: p
Question 115
Question
In RSA security relies on a ___ difference in difficulty between ___ (en/decrypt) and ___ (cryptanalyse) problems
Answer
-
large enough, easy, hard
-
small enough, hard, easy
-
small enough, easy, hard
-
large enough, hard, easy
Question 116
Question
Advanced Encryption Standard (AES), has three different configurations with respect to number of rounds and
Answer
-
Data Size
-
Round Size
-
Key Size
-
Encryption Size
Question 117
Question
_______ is a round cipher based on the Rijndael algorithm that uses a 128-bit block of data.
Question 118
Question
In asymmetric key cryptography, the private key is kept by
Question 119
Question
RSA was developed by:
Answer
-
Dr.Tahir El-Gamal
-
Diffie-Hellman
-
Shannon
-
Rivest, Shamir, Adleman
Question 120
Question
Encryption by receiver with sender’s public key:
Answer
-
C = Me mod N
-
M=Cd mod N
-
Ya=Xa mod Q
-
C=Km mod Q
Question 121
Question
RSA was founded in:
Question 122
Question
Decryption by sender with sender’s public key:
Answer
-
C=Me mod N
-
M=Cd mod N
-
Ya=Xa mod Q
-
C=Km mod Q
Question 123
Question
Calculate n and φ, if p = 3, and q = 11 (RSA)
Answer
-
n = 33, φ = 20
-
n = 20, φ = 33
-
n = 33, φ = 33
-
n = 33, φ = 22
Question 124
Question
Calculate n and φ, if p = 17, and q = 11 (RSA)
Answer
-
n = 187, φ = 160
-
n = 160, φ = 187
-
n = 187, φ = 187
-
n = 187, φ = 170
Question 125
Question
Calculate C (ciphertext), if p = 3, q = 11, e = 7, M = 2 (RSA)
Answer
-
C = 29
-
C = 3
-
C = 22
-
C = 2
Question 126
Question
Calculate M (plaintext), if p = 3, q = 11, d = 3, C = 29 (RSA)
Answer
-
M = 2
-
M = 29
-
M = 30
-
M = 1
Question 127
Question
Block size of AES plaintext:
Question 128
Question
Maximum AES number of rounds:
Question 129
Question
AES size of output(output parameter):
Question 130
Question
First public-key type scheme proposed by Diffie & Hellman in
Question 131
Question
Value of key depends on the: (Diffie & Hellman)
Answer
-
Participants
-
Keys
-
Message
-
Algorithm
Question 132
Question
If Alice and Bob subsequently communicate, they will have the____ key
Answer
-
Same
-
Different
-
Private
-
Public
Question 133
Question
Which of these are true about “a public-key distribution scheme ”?
Answer
-
cannot be used to exchange an arbitrary message
-
rather it can establish a common key
-
known only to the two participants
-
all of above
Question 134
Question
When by Diffie & Hellman along with the exposition of public key concepts?
Answer
-
1977
-
1978
-
1979
-
none of them
Question 135
Question
Which of them uses two keys( public and private):
Answer
-
RSA
-
Caesar
-
Vigenere
-
Playfair
Question 136
Question
A related private-key, known
Answer
-
only to the recipient
-
only to the sender
-
none of them
-
to everyone
Question 137
Question
The key must be kept secret for
Question 138
Question
The _________ attack can endanger the security of the Diffie-Hellman method if two parties are not authenticated to each other.
Answer
-
man-in-the-middle
-
ciphertext attack
-
plaintext attack
-
none of the above
Question 139
Question
“Using only a subset of letters/words in a longer message marked in some way ” is__
Answer
-
Caesar Cipher
-
RSA
-
DES
-
Steganography
Question 140
Question
For which cipher an example is given: “Say hi to IITU” After encrypt “Yas ih ot UTII”
Answer
-
Playfair Cipher
-
Transposition Cipher
-
Route Cipher
-
Steganography
Question 141
Question
Polyalphabetic substitution ciphers improve security using multiple cipher alphabets
Question 142
Question
For RSA to work, value of P must be less than value of:
Question 143
Question
In symmetric key cryptography, key used by sender and receiver is:
Answer
-
shаrеd
-
Different
-
Two keys are used
-
None
Question 144
Question
In symmetric-key cryptography, same key is used by:
Answer
-
One Party
-
Multi Party
-
Third Party
-
Both Party
Question 145
Answer
-
Rivеst, Shаmir,, Аdlеmаn
-
Roger, Shamir, Adrian
-
Robert, Shamir, Anthoney
-
Rivest, Shaw, Adleman
Question 146
Question
Which of them is first public-key type scheme?
Answer
-
Diffiе & Hеllmаn
-
Elgamal
-
RSA
-
AES
Question 147
Question
When Diffie & Hellman protocol was invented?
Question 148
Question
In Diffie & Hellman key exchange a public key is known only to the two participants
Question 149
Question
In Diffie & Hellman key exchange a public key is cannot be used to exchange an arbitrary message
Question 150
Question
Diffie & Hellman key exchange based on exponentiation in a finite (Galois) fields
Question 151
Question
In Diffie & Hellman protocol when the user A generates their key a secret key should be
Answer
-
XА < q
-
generated randomly
-
given by user B
-
none
Question 152
Question
Choose the correct formula for computing public key YA in Diffie & Hellman protocol
Answer
-
YА= а mod q
-
BA = a + b
-
CA = a – b
-
DA = a * b
Question 153
Question
Choose the correct formula for computing secret key K by user A in Diffie & Hellman protocol
Answer
-
K = (YА)^X А mod q
-
S = a + b
-
D = a * b
-
L = a * b + 2
Question 154
Question
Elgamal cryptography uses exponentiation in a finite (Galois) fields
Question 155
Question
In the Elgamal cryptography when the user A generates their key a secret key should be
Answer
-
1 < XА < q-1
-
generated randomly
-
given by user
-
none
Question 156
Question
Choose the correct formula for computing public key YA in Elgamal cryptography
Answer
-
YА = аXА mod q
-
K = YАk mod q
-
K = (YА)^X А mod q
-
YА= а mod q
Question 157
Question
Choose the correct formula for computing one-time key K in Elgamal cryptography
Answer
-
K = YАk mod q
-
S = a + b + 1
-
D = a * b + 2
-
L = a * b + 3
Question 158
Question
Choose the correct formula for computing C1 in Elgamal cryptography
Answer
-
C1 = аk mod q
-
C3 = a mod b
-
C = z + 2 + 5
-
C5 = a * b +2
Question 159
Question
Choose the correct formula for computing C2 in Elgamal cryptography
Answer
-
C2 = KM mod q
-
C = MK
-
C3 = AK
-
C4 = AA
Question 160
Question
In Elgamal cryptography public key cryptosystem related to D-H
Question 161
Question
Known plaintext is...
Answer
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
Attacker selects plaintext or ciphertext to en/decrypt
Question 162
Question
Chosen plaintext is...
Answer
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
Attacker selects plaintext or ciphertext to en/decrypt
Question 163
Question
Chosen ciphertext is...
Answer
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
Attacker selects plaintext or ciphertext to en/decrypt
Question 164
Question
Chosen text is ...
Answer
-
attacker knows suspects plaintext/ciphertext
-
only know algorithm & ciphertext, is statistical, must know or be able to identify plaintext
-
attacker selects plaintext and gets ciphertext
-
attacker selects ciphertext and gets plaintext
-
attacker selects plaintext or ciphertext to en/decrypt