Package deal
ECES|EC Council - Certified Encryption Specialist | bundle
ECES|EC Council - Certified Encryption Specialist | bundle
[Show more]ECES|EC Council - Certified Encryption Specialist | bundle
[Show more]DSA - correct answer FIPS 186 
 
AES - correct answer FIPS 197 
 
MD5 - correct answer RFC1321 
 
GOST - correct answer GOST 
 
Block Ciphers - correct answer Examples include: AES, TwoFish, Serpent, Skipjack, DES, 3DES 
 
Stream Ciphers - correct answer Examples include: RC4, FISH, Pike 
 
Hash Fu...
Preview 3 out of 17 pages
Add to cartDSA - correct answer FIPS 186 
 
AES - correct answer FIPS 197 
 
MD5 - correct answer RFC1321 
 
GOST - correct answer GOST 
 
Block Ciphers - correct answer Examples include: AES, TwoFish, Serpent, Skipjack, DES, 3DES 
 
Stream Ciphers - correct answer Examples include: RC4, FISH, Pike 
 
Hash Fu...
.cer/.crt/.der - correct answer x.509 Digital Certificates extensions - Typically binary encoded. (.cer is Microsoft convention) 
 
AES Phases - correct answer 1. SubBytes - non-linear substitution - uses Rijndael S-box 
2. Shiftrows - transposition 
3. MixColumns - mixing 
4. AddRoundKey 
 
IKE - ...
Preview 3 out of 28 pages
Add to cart.cer/.crt/.der - correct answer x.509 Digital Certificates extensions - Typically binary encoded. (.cer is Microsoft convention) 
 
AES Phases - correct answer 1. SubBytes - non-linear substitution - uses Rijndael S-box 
2. Shiftrows - transposition 
3. MixColumns - mixing 
4. AddRoundKey 
 
IKE - ...
What type of encryption uses different keys to encrypt and decrypt the message? 
 
+Secure 
+Asymmetric 
+Private key 
+Symmetric - correct answer Asymmetric 
 
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. 
 
The most widel...
Preview 3 out of 17 pages
Add to cartWhat type of encryption uses different keys to encrypt and decrypt the message? 
 
+Secure 
+Asymmetric 
+Private key 
+Symmetric - correct answer Asymmetric 
 
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. 
 
The most widel...
What is cryptography? - correct answer Noun - 
A) The process or skill of communicating in or deciphering secret writings or ciphers 
B) Secret writing 
Origin - 
Cryptography (or cryptology); derived from word kryptos which means "hidden", and grafo, which means "write", is the study of messa...
Preview 4 out of 55 pages
Add to cartWhat is cryptography? - correct answer Noun - 
A) The process or skill of communicating in or deciphering secret writings or ciphers 
B) Secret writing 
Origin - 
Cryptography (or cryptology); derived from word kryptos which means "hidden", and grafo, which means "write", is the study of messa...
How did the ATBASH cipher work? 
 
a. By shifting each letter a certain number of spaces 
b. By Multi alphabet substitution 
c. By rotating text a given number of spaces 
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.) - corre...
Preview 4 out of 46 pages
Add to cartHow did the ATBASH cipher work? 
 
a. By shifting each letter a certain number of spaces 
b. By Multi alphabet substitution 
c. By rotating text a given number of spaces 
d. By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.) - corre...
Mono-Alphabet Cipher - correct answer -this type of cipher substitutes one character of ciphertext for one character of plaintext 
 
Ceasar Cipher - correct answer -each letter is shifted a fixed number of spaces to the left or right in the alphabet 
 
-the shifting is the "key" 
 
-the shift is o...
Preview 4 out of 42 pages
Add to cartMono-Alphabet Cipher - correct answer -this type of cipher substitutes one character of ciphertext for one character of plaintext 
 
Ceasar Cipher - correct answer -each letter is shifted a fixed number of spaces to the left or right in the alphabet 
 
-the shifting is the "key" 
 
-the shift is o...
. How did the ATBASH cipher work? - correct answer By substituting each letter for the letter from the opposite end of the alphabet (i.e. Abecomes Z, B becomes Y, etc.) 
 
2. DES has a key space of what? - correct answer 2^56 
 
3. Which of the following are valid key sizes for AES (choose three)? -...
Preview 2 out of 8 pages
Add to cart. How did the ATBASH cipher work? - correct answer By substituting each letter for the letter from the opposite end of the alphabet (i.e. Abecomes Z, B becomes Y, etc.) 
 
2. DES has a key space of what? - correct answer 2^56 
 
3. Which of the following are valid key sizes for AES (choose three)? -...
PKCS #1 - correct answer RSA Cryptography Standard 
 
PKCS #3 - correct answer Diffie-Hellman Key Agreement Standard 
 
PKCS #5/RFC 2898 - correct answer Password-based Encryption Standard 
 
PKCS #8 - correct answer Private-Key Information Syntax Standard 
 
PKCS #13 - correct answer Elliptic Curve...
Preview 2 out of 10 pages
Add to cartPKCS #1 - correct answer RSA Cryptography Standard 
 
PKCS #3 - correct answer Diffie-Hellman Key Agreement Standard 
 
PKCS #5/RFC 2898 - correct answer Password-based Encryption Standard 
 
PKCS #8 - correct answer Private-Key Information Syntax Standard 
 
PKCS #13 - correct answer Elliptic Curve...
Asymmetric - correct answer What type of encryption uses different keys to encrypt and decrypt the message? 
 
RSA - correct answer The most widely used asymmetric encryption algorithim is what? 
 
Plaintext - correct answer Original, unencrypted information is referred to as ____. 
 
DES - correct ...
Preview 2 out of 5 pages
Add to cartAsymmetric - correct answer What type of encryption uses different keys to encrypt and decrypt the message? 
 
RSA - correct answer The most widely used asymmetric encryption algorithim is what? 
 
Plaintext - correct answer Original, unencrypted information is referred to as ____. 
 
DES - correct ...
What type of encryption uses different keys to encrypt and decrypt the message? 
 
+Secure 
+Asymmetric 
+Private key 
+Symmetric - correct answer Asymmetric 
 
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. 
 
The most widel...
Preview 4 out of 49 pages
Add to cartWhat type of encryption uses different keys to encrypt and decrypt the message? 
 
+Secure 
+Asymmetric 
+Private key 
+Symmetric - correct answer Asymmetric 
 
Asymmetric cryptography, also known as public key cryptography, uses public and private keys to encrypt and decrypt data. 
 
The most widel...
DES - correct answer Symmetric Block 
Key size: 56 
Block size: 64 
Feistel Cipher w/ 16 rounds, 48 bit key for each round. 
Use of 8 S-boxes 
 
3DES (Triple DES) - correct answer Symmetric Block 
Key size: 56 
Block size: 64 
Performs DES function 3 times w/ 3 different keys. 
 
DESx - correct answ...
Preview 2 out of 5 pages
Add to cartDES - correct answer Symmetric Block 
Key size: 56 
Block size: 64 
Feistel Cipher w/ 16 rounds, 48 bit key for each round. 
Use of 8 S-boxes 
 
3DES (Triple DES) - correct answer Symmetric Block 
Key size: 56 
Block size: 64 
Performs DES function 3 times w/ 3 different keys. 
 
DESx - correct answ...
Which of the following is generally true about key sizes? 
 
a. Larger key sizes increase security 
b. Smaller key sizes increase security 
c. Key size is irrelevant to security 
d. Key sizes must be more than 256 bits to be secure - correct answer a. Larger key sizes increase security 
 
How di...
Preview 4 out of 44 pages
Add to cartWhich of the following is generally true about key sizes? 
 
a. Larger key sizes increase security 
b. Smaller key sizes increase security 
c. Key size is irrelevant to security 
d. Key sizes must be more than 256 bits to be secure - correct answer a. Larger key sizes increase security 
 
How di...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller cracker. Stuvia facilitates payment to the seller.
No, you only buy these notes for $37.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
75759 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now