Which of the following algorithms uses three different keys to encrypt the plain text?
A. Skipjack
B. AES
C. Blowfish
D. 3DES
Symmetric algorithm. Designed by James Massey and Xuejia Lai. Operates on 64 bit blocks and has a 128 bit key. Consists of 8 identical transformations each round and an output transformation.
A. IDEA
B. RSA
C. CAST
D. DES
A cryptographic hash function which uses a Merkle tree-like structure to allow for immense parallel computation of hashes for very long inputs. Authors claim a performance of 28 cycles per byte for MD6-256 on an Intel Core 2 Duo and provable resistance against differential cryptanalysis.
A. TIGER
B. GOST
C. MD5
D. MD6
Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
A. WEP
B. WEP2
C. WPA
D. WPA2
Which of the following is a cryptographic protocol that allows two parties to establish a shared key over an insecure channel?
A. Elliptic Curve
B. NMD5
C. RSA
D. Diffie-Hellman
The concept that if one bit of data changes, the cipher text will all completely change as well.
A. Avalanche
B. Substitution
C. Confusion
D. Collision
____________cryptography uses one key to encrypt a message and a different key to decrypt it.
A. Secure
B. Asymmetric
C. Stream
D. Symmetric
A cipher is defined as what
A. The algorithm(s) needed to encrypt and decrypt a message
B. Encrypted text
C. The key used to encrypt a message
D. Any algorithm used in cryptography