DES has been replaced by advanced encryption standard (AES) where the latter is preferred as an encryption algorithm for new products. The AES is a symmetric key encryption algorithm to protect electronic data as it is fast and strong due to its Key-Block-Round combination. The strength of DES is no longer sufficient.
131. What keys are used to create digital signatures?
a.
Public-key cryptographyb.
Private-key cryptographyc.
Hybrid-key cryptographyd.
Primary-key cryptography131. a.
Public-key cryptography has been recommended for distribution of secret keys and in support of digital signatures. Private-key cryptography has been recommended for encryption of messages and can be used for message integrity check computations. Hybrid keys combine the best of both public and private keys. Primary keys are used in database design and are not relevant here. 132. Elliptic curve systems are which of the following?
1.
Asymmetric algorithms2.
Symmetric algorithms3.
Public-key systems4.
Private-key systemsa.
2 and 3b.
1 and 3c.
2 and 4d.
1 and 4132. b.
Elliptic curve systems are public-key (asymmetric) cryptographic algorithms. DES is private-key (symmetric) cryptographic algorithms.133. Data encryption standard (DES)
cannot provide which of the following security services? a.
Encryptionb.
Access controlc.
Integrityd.
Authentication133. d.
Data encryption standard (DES) provides encryption, access control, integrity, and key management standards. It cannot provide authentication services. The DES is a cryptographic algorithm designed for access to and protection of unclassified data. Because the original “single” DES is insecure, the Triple DES should be used instead. 134. The elliptic curve system uses which of the following to create digital signatures?
a.
Hash algorithmb.
Prime algorithmc.
Inversion algorithmd.
Linear algorithm134. a.
The elliptic curve systems are used to create digital signatures with a hash algorithm such as SHA-1 (160-bit key). The SHA-1 is used to generate a condensed representation of a message called a message digest. SHA-1 is a technical revision of SHA. A secure hash algorithm (SHA) is used to generate a condensed message representation called a message digest. SHA is used by PGP or GNU PGP to generate digital signatures. 135. Which of the following clearly defines end-to-end encryption?
1.
Encryption at origin2.
Decryption at destination3.
Visible routing information4.
No intermediate decryptiona.
1 and 2b.
3 and 4c.
1, 2, and 3d.
1, 2, 3, and 4135. d.
End-to-end encryption refers to communications encryption in which data is encrypted when being passed through a network (i.e., encryption at origin and decryption at destination) but routing information remains visible without intermediate decryption. End-to-end encryption is safe as end-to-end security in that information is safeguarded from point of origin to point of destination. 136. Which one of the following provides data integrity?
a.
Cyclic redundancy checksb.
Digitized signaturesc.
Passwords and PINsd.
Biometrics136. a.
A cyclic redundancy check (CRC) can be used to verify the integrity of data transmitted over a communications line. Passwords, PINs, and biometrics can be used to authenticate user identity. Digitized signatures do not provide data integrity because they are simply created by scanning a handwritten signature. 137. Symmetric key algorithms are ideally suited for which of the following?
a.
Authenticationb.
Integrityc.
Confidentialityd.
Nonrepudiation137. c.
Symmetric key cryptography is a class of algorithms where parties share a secret key. These algorithms are primarily used to achieve confidentiality but may also be used for authentication, integrity, and limited nonrepudiation services.138. Which of the following is the
most efficient way of handling the redundancy built into the encrypted messages in detecting transmission errors?a.
Using cyclic redundancy check (CRC) polynomial codeb.
Using CRC codec.
Using Hamming coded.
Using parity bit code