ECCouncil 212-81 Practice Test - Questions Answers, Page 14
List of questions
Related questions
What is the basis for the FISH algorithm?
If the round function is a cryptographically secure pseudorandom function, then ___rounds is sufficient to make it a 'strong' pseudorandom permutation.
Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?
John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?
Numbers that have no factors in common with another.
Created by D. H. Lehmer. It is a classic example of a Linear congruential generator. A PRNG type of linear congruential generator (LCG) that operates in multiplicative group of integers modulo n. The basic algorithm is Xi+1=(aXi + c) mod m, with 0 Xi m.
Which algorithm implements an unbalanced Feistel cipher?
What is a variation of DES that uses a technique called Key Whitening?
You are explaining the details of the AES algorithm to cryptography students. You are discussing the derivation of the round keys from the shared symmetric key. The portion of AES where round keys are derived from the cipher key using Rijndael's key schedule is called what?
Question