Join the discussion
Question 1/86
What is a "Collision attack" in cryptography?
Correct Answer: D
Collision attacks try to find two inputs producing the same
https://en.wikipedia.org/wiki/Collision_attack
A collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage attack where a specific target hash value is specified.
https://en.wikipedia.org/wiki/Collision_attack
A collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage attack where a specific target hash value is specified.
Add Comments
- Other Question (86q)
- Q1. What is a "Collision attack" in cryptography?
- Q2. Which of the following is a substitution cipher used by ancient Hebrew scholars?...
- Q3. What is the name of the attack where the attacker obtains the ciphertexts corresponding to...
- Q4. If the round function is a cryptographically secure pseudorandom function, then ___rounds ...
- Q5. What is the solution to the equation 8 mod 3?
- Q6. A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used...
- Q7. Which of the following is an asymmetric cipher?...
- Q8. Storing private keys with a third party is referred to as what?...
- Q9. An attack that is particularly successful against block ciphers based on substitution-perm...
- Q10. If Bob is using asymmetric cryptography and wants to send a message to Alice so that only ...
- Q11. Collision resistance is an important property for any hashing algorithm. Joan wants to fin...
- Q12. Which of the following is not a key size used by AES?...
- Q13. Which of the following asymmetric algorithms is described by U.S. Patent 5,231,668 and FIP...
- Q14. You have been tasked with selecting a digital certificate standard for your company to use...
- Q15. A ______ refers to a situation where two different inputs yield the same output....
- Q16. Original, unencrypted information is referred to as ____....
- Q17. Which of the following is an asymmetric algorithm that was first publically described in 1...
- Q18. Which one of the following uses three different keys, all of the same size?...
- Q19. Which one of the following wireless standards uses AES using the Counter Mode-Cipher Block...
- Q20. Which of the following is a fundamental principle of cryptography that holds that the algo...
- Q21. In a ______ the attacker discovers a functionally equivalent algorithm for encryption and ...
- Q22. Why is quantum computing a threat to RSA?
- Q23. In a Feistel cipher, the two halves of the block are swapped in each round. What does this...
- Q24. Ferris has been assigned the task of selecting security for his company's wireless network...
- Q25. Which algorithm was U. S. Patent 5,231,668, filed on july 26, 1991, attributed to David W....
- Q26. This hash function uses 512-bit blocks and implements preset constants that change after e...
- Q27. Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another m...
- Q28. Cryptographic hashes are often used for message integrity and password storage. It is impo...
- Q29. Bruce Schneier is a well-known and highly respected cryptographer. He has developed severa...
- Q30. John is trying to select the appropriate authentication protocol for his company. Which of...
- Q31. Ciphers that write message letters out diagonally over a number of rows then read off ciph...
- Q32. The greatest weakness with symmetric algorithms is _____....
- Q33. Which one of the following is an example of a symmetric key algorithm?...
- Q34. If you wished to see a list of revoked certificates from a CA, where would you look?...
- Q35. Uses a formula, M_n = 2^n − 1 where n is a prime number, to generate primes. Works for 2,...
- Q36. A real time protocol for verifying certificates (and a newer method than CRL)....
- Q37. Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input m...
- Q38. What must occur in order for a cipher to be considered 'broken'?...
- Q39. Numbers that have no factors in common with another....
- Q40. A number that is used only one time, then discarded is called what?...
- Q41. A part of understanding symmetric cryptography understands the modes in which it can be us...
- Q42. Created in 1977 by Ron Rivest, Adi Shamir, and Leonard Adleman at MIT. Most widely used pu...
- Q43. What size key does Skipjack use?
- Q44. The most widely used digital certificate standard. First issued July 3, 1988. It is a digi...
- Q45. A list of certificates that have been revoked....
- Q46. In a Feistel cipher, the two halves of the block are swapped in each round. What does this...
- Q47. All of the following are key exchange protocols except for____...
- Q48. Changing some part of the plain text for some matching part of cipher text. Historical alg...
- Q49. Which of the following acts as a verifier for the certificate authority?...
- Q50. A cryptanalysis success where the attacker deduces the secret key....
- Q51. What size block does FORK256 use?
- Q52. During the process of encryption and decryption, what keys are shared?...
- Q53. A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel ...
- Q54. Which of the following is generally true about key sizes?...
- Q55. Which of the following is a block cipher?
- Q56. Juanita is attempting to hide some text into a jpeg file. Hiding messages inside another m...
- Q57. What is an IV?
- Q58. In order to understand RSA. you must understand the key generation algorithm as well as th...
- Q59. Which component of IPsec performs protocol-level functions that are required to encrypt an...
- Q60. ____________cryptography uses one key to encrypt a message and a different key to decrypt ...
- Q61. Which of the following is the successor of SSL?...
- Q62. Which one of the following best describes a process that splits the block of plaintext int...
- Q63. Terrance oversees the key escrow server for his company. All employees use asymmetric cryp...
- Q64. Software for maintaining an on-the-fly-encrypted volume. Data is automatically encrypted r...
- Q65. A symmetric block cipher designed in 1993 by Bruce Schneier. Was intended as a replacement...
- Q66. You are explaining the details of the AES algorithm to cryptography students. You are disc...
- Q67. Which one of the following is a component of the PKI?...
- Q68. When learning algorithms, such as RSA, it is important to understand the mathematics being...
- Q69. What size block does AES work on?
- Q70. A transposition cipher invented 1918 by Fritz Nebel, used a 36 letter alphabet and a modif...
- Q71. What is a variation of DES that uses a technique called Key Whitening?...
- Q72. In IPSec, if the VPN is a gateway-gateway or a host-gateway, then which one of the followi...
- Q73. _____ uses at least two different shifts, changing the shift with different letters in the...
- Q74. A protocol for key aggreement based on Diffie-Hellman. Created in 1995. Incorporated into ...
- Q75. Bob's password is hashed, and so is John's. Even though they used different passwords, the...
- Q76. Hash. Created by Ronald Rivest. Replaced MD4. 128 bit output size, 512 bit block size, 32 ...
- Q77. How can rainbow tables be defeated?
- Q78. You are trying to find a modern method for security web traffic for use in your company's ...
- Q79. A _______ product refers to an NSA-endorsed classified or controlled cryptographic item fo...
- Q80. Cylinder tool. Wrap leather around to decode. The diameter is the key. Used in 7th century...
- Q81. Which of the following algorithms uses three different keys to encrypt the plain text?...
- Q82. John is going to use RSA to encrypt a message to Joan. What key should he use?...
- Q83. Which of the following uses an 80 bit key on 64 bit blocks?...
- Q84. Encryption of the same plain text with the same key results in the same cipher text. Use o...
- Q85. Which analysis type is based on the statistics of the numbers of unique colors and close-c...
- Q86. Basic information theory is the basis for modern symmetric ciphers. Understanding the term...
