Lesson 5 Summarizing Basic Cryptographic Concepts
Lesson 5 Summarizing Basic Cryptographic Concepts
18.
1.D
2.B
Option D is only partially correct in stating that symmetric encryption is not as safe as
asymmetric encryption, but it also mentions compatibility, which isn't a direct trade-
off between the two types of encryption.
3.A
Symmetric encryption is efficient and used when large amounts of data need to be
encrypted. It uses the same key for both encryption and decryption.
4.A
5.C
In a block cipher, if there is not enough data in the plaintext, it's padded to the
correct size. Padding is not an issue with streaming, where each byte or bit of
data in the plaintext is encrypted one at a time, but it is problematic in dealing
with block size.
A block cipher is not suitable to communications, but a stream cipher is, since
each byte or bit of data in the plaintext is encrypted one at a time.
Based on the value of the key used, a stream cipher is not subjected to
complex transposition and substitution operations.
6.A
7.A
Perfect forward secrecy (PFS) mitigates the risk from RSA key exchange,
using Diffie-Hellman (D-H) key agreement to create ephemeral session keys
without using the server's private key.
Modes of operation refer to AES use in a cipher suite. Cipher Block Chaining
(CBC) mode applies an initialization vector (IV) to a chain of plaintext data
and uses padding to fill out blocks of data.
Counter mode makes the AES algorithm work as a stream cipher. Each block
of data can be processed individually and in parallel, improving performance.
8.B
Counter Mode (CTM) combines each block with a counter value, allowing each block
to be processed individually and in parallel, improving performance. This parallel
processing is similar to how stream ciphers operate.
While ECB and CBC modes are both modes of operation for block ciphers, they do
not allow block ciphers to behave like stream ciphers.
ECB mode does not allow block ciphers to behave like stream ciphers. As mentioned
earlier, ECB mode applies the same key to each plaintext block, resulting in identical
plaintext blocks producing identical ciphertexts, which is not how a stream cipher
operates.
While CTM mode does allow block ciphers to behave like stream ciphers, CBC mode
does not. As mentioned earlier, CBC mode applies an Initialization Vector (IV) to the
first plaintext block to ensure that the key produces a unique ciphertext from any
given plaintext, which is not how a stream cipher behaves.
9.C
For some use cases, the time required to obtain a result is more important
than a data rate. Latency issues may negatively affect performance when an
operation or application times out before the authentication handshake.
Cost issues may arise in any decision-making process, but for mobile device
cryptography, computing overhead is a primary limiting factor.
10.B
11.AD
Integrity allows two parties to derive the same checksum and show that a
message or data is unaltered. However, since an adversary is using the
image with a hidden message, it can be assumed that its purpose is not
integrity between the two parties.
12.D
Key stretching takes a key that is generated from a user password and
repeatedly converts it to a longer and more random key, adding extra layers
of processing to a potential attacker’s task.
Public key cryptography (public and private keys) can be used to authenticate
a sender. Combine this with a hash output of the message and a secret (or
private) key to create a message authentication code (MAC) to validate the
integrity of the message.
14.C
Key stretching takes a key that is generated from a user password and
repeatedly converts it to a longer and more random key, through thousands of
rounds of hashing.
15.B
A digital signature proves the identity of the sender of a message and to show
that a message has not been tampered with since the sender posted it. This
provides authentication, integrity, and non-repudiation.
A private key will encrypt the message. Encrypting the message will scramble
the data to protect it during transmission.
The public key is what the recipient will use to decrypt the message. The
decryption will allow the recipient to read the data upon receipt.
An RSA Algorithm is what many of the public key cryptography products are
based on.
16.A
The administrator should have validated the software with a checksum, which
uses a cryptographic algorithm to generate a unique hash value based on the
file contents. If the file is changed, the checksum of the modified file will not
match the original.
17.A
18.C
Non-repudiation is when the sender cannot deny sending the message. If the
message has been encrypted in a way known only to the sender, logic follows
the sender must have composed it.