What is the basis for the difficulty in breaking RSA?
Correct Answer: D
Factoring numbers https://en.wikipedia.org/wiki/RSA_(cryptosystem) RSA (Rivest-Shamir-Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly, in 1973 at GCHQ (the British signals intelligence agency), by the English mathematician Clifford Cocks. That system was declassified in 1997. In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret (private). An RSA user creates and publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers are kept secret. Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers.
Question 67
The reverse process from encoding - converting the encoded message back into its plaintext format.
Correct Answer: D
Decoding Decoding - reverse process from encoding,converting the encoded message back into its plaintext format.
Question 68
RFC 1321 describes what hash?
Correct Answer: D
MD5 https://en.wikipedia.org/wiki/MD5 MD5 was designed by Ronald Rivest in 1991 to replace an earlier hash function MD4, and was specified in 1992 as RFC 1321.
Question 69
What size block does FORK256 use?
Correct Answer: B
512 https://en.wikipedia.org/wiki/FORK-256 FORK-256 was introduced at the 2005 NIST Hash workshop and published the following year.[6] FORK-256 uses 512-bit blocks and implements preset constants that change after each repetition. Each block is hashed into a 256-bit block through four branches that divides each 512 block into sixteen 32-bit words that are further encrypted and rearranged
Question 70
The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.
Correct Answer: A
Steganography https://en.wikipedia.org/wiki/Steganography Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video. The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle. Incorrect answers: Avalanche effect - the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext. Cryptosystem - a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption) Key Schedule - an algorithm for the key that calculates the subkeys for each round that the encryption goes through.