CISSP Study #2
Terms
undefined, object
copy deck
- A cryptographic algorithm is also known as:
- A Cipher
- A primary goal of the TLS protocol is to provide:
- Privacy and Data Integrity between two communicating applications
-
y2 = x3 + ax + b
represents the - Elliptic Curve Discrete Logarithm problem (El Gamal)
- A message of <2(64) bits is input to SHA, which produces a message digest of 160 bits, which is then fed to DSA. This describes what standard?
- DSS from NIST. The Digital Signature Standard.
- An attack on a hash that attempts to find a collision based on the probability that two different messages using the same hash function will produce the same message digest.
- Birthday attack
- Minimum 3 pieces of information required on a digital certificate is
-
Name
Public Key
Digital Signature of the Certifier - The sequence for decrypting transmissions on the Clipper chip is:
-
1. Use family key to decrypt the LEAF, recover U
2. Obtain court order for two halves of Ku, obtain Ku
3. Use Ku to Recover session key
4. Decrypt message with session key - What is another Key Escrow approach (or standard) besides Clipper?
- Capstone
- An algorithm that operates on a fixed length block of plaintext and breaks it into fixed length blocks of ciphertext is called:
- Block Cipher
- What is the term for a set of subkeys derived from a secret key
- Key Schedule
- TLS is based on what protocol?
- SSL 3.0
- TLS supports C I A above which OSI layer?
- Transport Layer
- AES (Rijndael) Encryption block size is 128 bits and key sizes are:
- 128, 192, 256 bits
- The algorithm used to secure Wireless communications in 802.11 standards is called:
- WEP (Wired Equivalent Privacy) it's a Secret key algorithm (symmetric)