ExamGecko
Home Home / ECCouncil / 212-81

ECCouncil 212-81 Practice Test - Questions Answers, Page 10

Question list
Search
Search

Related questions











A cryptanalysis success where the attacker deduces the secret key.

A.
Information Deduction
A.
Information Deduction
Answers
B.
Avalanche effect
B.
Avalanche effect
Answers
C.
Shannon's Entropy
C.
Shannon's Entropy
Answers
D.
Total Break
D.
Total Break
Answers
Suggested answer: D

Explanation:

Total Break

https://en.wikipedia.org/wiki/Cryptanalysis

The results of cryptanalysis can also vary in usefulness. For example, cryptographer Lars Knudsen (1998) classified various types of attack on block ciphers according to the amount and quality of secret information that was discovered:

Total break --- the attacker deduces the secret key.

Global deduction --- the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.

Instance (local) deduction --- the attacker discovers additional plaintexts (or ciphertexts) not previously known.

Information deduction --- the attacker gains some Shannon information about plaintexts (or ciphertexts) not previously known.

Distinguishing algorithm --- the attacker can distinguish the cipher from a random permutation.

Incorrect answers:

Shannon's Entropy - average level of 'information', 'surprise', or 'uncertainty' inherent in the variable's possible outcomes. The concept of information entropy was introduced by Claude Shannon in his 1948 paper 'A Mathematical Theory of Communication'.

Avalanche effect - the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext.

All of the following are key exchange protocols except for____

A.
MQV
A.
MQV
Answers
B.
AES
B.
AES
Answers
C.
ECDH
C.
ECDH
Answers
D.
DH
D.
DH
Answers
Suggested answer: B

Changing some part of the plain text for some matching part of cipher text. Historical algorithms typically use this.

A.
Decoding
A.
Decoding
Answers
B.
Substitution
B.
Substitution
Answers
C.
Transposition
C.
Transposition
Answers
D.
Collision
D.
Collision
Answers
Suggested answer: B

Explanation:

Substitution

https://en.wikipedia.org/wiki/Substitution_cipher

In cryptography, a substitution cipher is a method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the 'units' may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.

Incorrect answers:

Decoding - the reverse process from encoding - converting the encoded message back into its plaintext format.

Collision - occurs when a hash function generates the same output for different inputs.

Transposition - a method of encryption by which the positions held by units of plaintext (which are commonly characters or groups of characters) are shifted according to a regular system, so that the ciphertext constitutes a permutation of the plaintext. That is, the order of the units is changed (the plaintext is reordered). Mathematically a bijective function is used on the characters' positions to encrypt and an inverse function to decrypt.

Changes to one character in the plain text affect multiple characters in the cipher text, unlike in historical algorithms where each plain text character only affect one cipher text character.

A.
Substitution
A.
Substitution
Answers
B.
Avalanche
B.
Avalanche
Answers
C.
Confusion
C.
Confusion
Answers
D.
Diffusion
D.
Diffusion
Answers
Suggested answer: D

Explanation:

Diffusion

https://en.wikipedia.org/wiki/Confusion_and_diffusion

Diffusion means that if we change a single bit of the plaintext, then (statistically) half of the bits in the ciphertext should change, and similarly, if we change one bit of the ciphertext, then approximately one half of the plaintext bits should change.[2] Since a bit can have only two states, when they are all re-evaluated and changed from one seemingly random position to another, half of the bits will have changed state.

The idea of diffusion is to hide the relationship between the ciphertext and the plain text.

This will make it hard for an attacker who tries to find out the plain text and it increases the redundancy of plain text by spreading it across the rows and columns; it is achieved through transposition of algorithm and it is used by block ciphers only.

Incorrect answers:

Confusion - Confusion means that each binary digit (bit) of the ciphertext should depend on several parts of the key, obscuring the connections between the two.

The property of confusion hides the relationship between the ciphertext and the key.

This property makes it difficult to find the key from the ciphertext and if a single bit in a key is changed, the calculation of the values of most or all of the bits in the ciphertext will be affected.

Confusion increases the ambiguity of ciphertext and it is used by both block and stream ciphers.

Avalanche - the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext.

Substitution - method of encrypting by which units of plaintext are replaced with ciphertext, according to a fixed system; the 'units' may be single letters (the most common), pairs of letters, triplets of letters, mixtures of the above, and so forth. The receiver deciphers the text by performing the inverse substitution.

What is a TGS?

A.
The server that escrows keys
A.
The server that escrows keys
Answers
B.
A protocol for encryption
B.
A protocol for encryption
Answers
C.
A protocol for key exchange
C.
A protocol for key exchange
Answers
D.
The server that grants Kerberos tickets
D.
The server that grants Kerberos tickets
Answers
Suggested answer: D

Explanation:

The server that grants Kerberos tickets

https://en.wikipedia.org/wiki/Kerberos_(protocol)

The client authenticates itself to the Authentication Server (AS) which forwards the username to a key distribution center (KDC). The KDC issues a ticket-granting ticket (TGT), which is time stamped and encrypts it using the ticket-granting service's (TGS) secret key and returns the encrypted result to the user's workstation. This is done infrequently, typically at user logon; the TGT expires at some point although it may be transparently renewed by the user's session manager while they are logged in.

Which of the following is a key exchange protocol?

A.
MQV
A.
MQV
Answers
B.
AES
B.
AES
Answers
C.
DES
C.
DES
Answers
D.
RSA
D.
RSA
Answers
Suggested answer: A

Explanation:

MQV

https://en.wikipedia.org/wiki/MQV

MQV (Menezes--Qu--Vanstone) is an authenticated protocol for key agreement based on the Diffie--Hellman scheme. Like other authenticated Diffie--Hellman schemes, MQV provides protection against an active attacker. The protocol can be modified to work in an arbitrary finite group, and, in particular, elliptic curve groups, where it is known as elliptic curve MQV (ECMQV).

Incorrect answers:

RSA - (Rivest--Shamir--Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977.

AES - Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

DES - Data Encryption Standard is a symmetric-key algorithm for the encryption of digital data.

The art and science of writing hidden messages so that no one suspects the existence of the message, a type of security through obscurity. Message can be hidden in picture or audio file for example. Uses least significant bits in a file to store data.

A.
Steganography
A.
Steganography
Answers
B.
Cryptosystem
B.
Cryptosystem
Answers
C.
Avalanche effect
C.
Avalanche effect
Answers
D.
Key Schedule
D.
Key Schedule
Answers
Suggested answer: A

Explanation:

Steganography

https://en.wikipedia.org/wiki/Steganography

Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.

The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle.

Incorrect answers:

Avalanche effect - the desirable property of cryptographic algorithms, typically block ciphers and cryptographic hash functions, wherein if an input is changed slightly (for example, flipping a single bit), the output changes significantly (e.g., half the output bits flip). In the case of high-quality block ciphers, such a small change in either the key or the plaintext should cause a drastic change in the ciphertext.

Cryptosystem - a suite of cryptographic algorithms needed to implement a particular security service, most commonly for achieving confidentiality (encryption)

Key Schedule - an algorithm for the key that calculates the subkeys for each round that the encryption goes through.

What is the basis for the difficulty in breaking RSA?

A.
Hashing
A.
Hashing
Answers
B.
The birthday paradox
B.
The birthday paradox
Answers
C.
Equations that describe an elliptic curve
C.
Equations that describe an elliptic curve
Answers
D.
Factoring numbers
D.
Factoring numbers
Answers
Suggested answer: D

Explanation:

Factoring numbers

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

RSA (Rivest--Shamir--Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly, in 1973 at GCHQ (the British signals intelligence agency), by the English mathematician Clifford Cocks. That system was declassified in 1997.

In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret (private). An RSA user creates and publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers are kept secret. Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers.

What best describes the shifting of each letter a fixed number of spaces to the left or right?

A.
Single substitution
A.
Single substitution
Answers
B.
Multi substitution
B.
Multi substitution
Answers
C.
XOR
C.
XOR
Answers
D.
Bit shifting
D.
Bit shifting
Answers
Suggested answer: D

Explanation:

Single substitution

https://en.wikipedia.org/wiki/Substitution_cipher#Simple_substitution

Substitution of single letters separately---simple substitution---can be demonstrated by writing out the alphabet in some order to represent the substitution. This is termed a substitution alphabet. The cipher alphabet may be shifted or reversed (creating the Caesar and Atbash ciphers, respectively) or scrambled in a more complex fashion, in which case it is called a mixed alphabet or deranged alphabet.

Which analysis type is based on the statistics of the numbers of unique colors and close-color pairs in a 24-bit image, a method that analyzes the pairs of colors created by LSB embedding?

A.
Differential Analysis
A.
Differential Analysis
Answers
B.
Discrete Cosine Transform
B.
Discrete Cosine Transform
Answers
C.
Raw Quick Pair
C.
Raw Quick Pair
Answers
D.
Chi squared analysis
D.
Chi squared analysis
Answers
Suggested answer: D

Explanation:

Raw Quick Pair

https://www.cs.auckland.ac.nz/courses/compsci725s2c/archive/termpapers/yy.pdf

Du and Long2 (2000) introduced Raw Quick Pairs detecting method of Stego-images (the images that contain the steganographic message). The underlying principle of the method is that the number of close color pairs of Stego-images will be larger compare with the number of close color pairs of normal images. In contrast, Fridrich and Goljan (2001) pointed out that RQP method only works if the number of unique colors is relatively low; and the method can not be applied to grayscale images. However, this paper will outline the core principle of RQP method; and evaluate such critical comments in details. In addition, this paper suggests potential improvement of RQP method and provides one possible alternative.

Incorrect answers:

Chi squared analysis - https://en.wikipedia.org/wiki/Chi-squared_test

Differential Analysis - https://en.wikipedia.org/wiki/Differential_cryptanalysis

Discrete Cosine Transform - https://en.wikipedia.org/wiki/Discrete_cosine_transform

Total 206 questions
Go to page: of 21