Cryptography
Quantitative Analysis
Symmetric Algorithms
Encryption Algorithm Modes
Asymmetric Algorithms
100

The primary organization that verifies a certificate applicant's information and identity.

What is a Registration Authority (RA)?

100

The potential loss associated with a single realized threat against a specific asset.

What is single-loss expectancy (SLE)?

100

A 64-bit block cipher that has five modes of operation and is considered to no longer be secure?

What is Data Encryption Standard (DES)?

100

Each block of plaintext is independently encrypted into a respective block of ciphertext. (can be done in parallel).

What is Electronic Code Book (ECB)?

100

A trusted entity or third party that issues and assigns public key certificates, thereby attesting to the validity of the public keys.

What is a Certificate Authority (CA)?

200

A basic transformation technique and another name for binary addition.

What is Exclusive-OR?

200

An element of quantitative risk analysis that represents the percentage of loss if an asset were violated by a realized risk.

What is Exposure Factor (EF)?

200

The the only variant of 3DES that is currently considered secure by NIST?

What is DES EE3?

200

Each block of unencrypted text is XORed with the block of ciphertext immediately preceding it before it is encrypted.

What is Cipher Block Chaining (CBC) mode?

200

A digitally signed, special block of data that contains a public key and the identifying information for the entity, or principal that owns the associated private key.

What is a certificate?

300

Scrambling a plaintext message by using an algorithm, usually in conjunction with a key.

What is to encrypt/encipher?

300

SLE = AV * EF

What is the calculation for SLE?

300

It operates on 64-bit blocks of plaintext/ciphertext, but it begins its operation with a 128-bit key.

What is International Data Encryption Algorithm (IDEA)?

300

The streaming cipher version of CBC. It operates in real-time, loads messages into memory buffers of the same block size and then encrypts.


What is Cipher Feedback (CFB) mode?

300

Proves that the message has not been altered (Message Integrity), and it proves who sent the message (Proof of Origin and non-repudiation)

What is Digital Signature?

400

The assumption that all algorithms should be public but all keys should remain private?

What is Kerckhoffs’s principle?

400

ALE = SLE * ARO

What is the calculation for Annualized Loss Expectancy?

400

Operates on 64-bit blocks of text, but allows the use of variable-length keys ranging from 32 bits to 448 bits.

What is Blowfish?

400

XORs the plaintext with a seed value. For the first encrypted block, an initialization vector is used to create the seed value.

What is Output Feedback (OFB) mode?

400

The addition of new users requires the generation of only one public-private key pair.

What are asymmetric algorithms?

500

It is used to increase the strength of cryptography by creating a unique ciphertext every time the same message is encrypted with the same key

What is an initialization vector?

500

The expected frequency with which a specific threat or risk will occur within a single year.

What is the annualized rate of occurrence (ARO)?

500

Uses a single round of encryption and allows the use of variable-length keys ranging from 40 bits to 2,048 bits.

What is Rivest Cipher 4 (RC4)?

500

Uses a stream cipher similar to that used in CFB and OFB, but uses a simple counter that increments for each operation. Errors do not propagate.

What is Counter (CTR) mode?

500

This algorithm depends on the computational difficulty inherent in factoring the product of large prime numbers.

What is the RSA algorithm?

M
e
n
u