This site is 100% ad supported. Please add an exception to adblock for this site.

CISSP Study #2

Terms

undefined, object
copy deck
A cryptographic algorithm is also known as:
A Cipher
A primary goal of the TLS protocol is to provide:
Privacy and Data Integrity between two communicating applications
y2 = x3 + ax + b
represents the
Elliptic Curve Discrete Logarithm problem (El Gamal)
A message of <2(64) bits is input to SHA, which produces a message digest of 160 bits, which is then fed to DSA. This describes what standard?
DSS from NIST. The Digital Signature Standard.
An attack on a hash that attempts to find a collision based on the probability that two different messages using the same hash function will produce the same message digest.
Birthday attack
Minimum 3 pieces of information required on a digital certificate is
Name
Public Key
Digital Signature of the Certifier
The sequence for decrypting transmissions on the Clipper chip is:
1. Use family key to decrypt the LEAF, recover U
2. Obtain court order for two halves of Ku, obtain Ku
3. Use Ku to Recover session key
4. Decrypt message with session key
What is another Key Escrow approach (or standard) besides Clipper?
Capstone
An algorithm that operates on a fixed length block of plaintext and breaks it into fixed length blocks of ciphertext is called:
Block Cipher
What is the term for a set of subkeys derived from a secret key
Key Schedule
TLS is based on what protocol?
SSL 3.0
TLS supports C I A above which OSI layer?
Transport Layer
AES (Rijndael) Encryption block size is 128 bits and key sizes are:
128, 192, 256 bits
The algorithm used to secure Wireless communications in 802.11 standards is called:
WEP (Wired Equivalent Privacy) it's a Secret key algorithm (symmetric)

Deck Info

14

permalink