Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 bit word size, 64 rounds. Infamously compromised by Flame malware in 2012.
Which one of the following wireless standards uses the Advanced Encryption Standard (AES) using the Counter Mode-Cipher Block Chaining (CBC)-Message Authentication Code (MAC) Protocol (CCMP)?
In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.
Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?
Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.
A part of understanding symmetric cryptography understands the modes in which it can be used. You are
explaining those modes to a group of cryptography students. The most basic encryption mode is____________.
The message is divided into blocks, and each block is encrypted separately with no modification to the process.
Nicholas is working at a bank in Germany. He is looking at German standards for pseudo random number generators. He wants a good PRNG for generating symmetric keys. The German Federal Office for Information Security (BSI) has established four criteria for quality of random number generators. Which ones can be used for cryptography?
In order to understand RSA. you must understand the key generation algorithm as well as the encryption and decryption algorithms. Which one of the following equations describes the encryption process for RSA?