Cryptography & PKI | Test-4
This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.
1 / 15
1. Which of the following are the currently approved Digital signature standard algorithms:
According to the latest review FIPS 186-5 published on 03-02-2023 for Digital Signature Standard (DSS) all the algorithms mentioned are specified in the specification.
2 / 15
2. _________are pre-computed tables used in password cracking to quickly reverse hash functions. These tables contain pairs of plaintext passwords and their corresponding hash values. Use the correct terminology
Rainbow tables are pre-computed tables used in password cracking to quickly reverse hash functions. These tables contain pairs of plaintext passwords and their corresponding hash values. Instead of computing hashes on-the-fly during an attack, attackers can look up the pre-computed hash values in the rainbow table to find the corresponding plaintext passwords. Rainbow tables are effective against hash functions that lack salting and are considered a security risk, emphasizing the importance of using strong hashing techniques and salting to protect passwords.
3 / 15
3. _______ is a standard for securing email messages using cryptographic techniques. It provides a way to encrypt and digitally sign email content, ensuring confidentiality, integrity, authentication, and non-repudiation.
The correct answer is S/MIME.
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for securing email messages using cryptographic techniques. It provides a way to encrypt and digitally sign email content, ensuring confidentiality, integrity, authentication, and non-repudiation. S/MIME uses public key infrastructure (PKI) to manage the encryption keys and certificates needed for secure communication.
Hereโs a brief overview of the other options:
4 / 15
4. The strength of crypto system relies solely on the strength of the key; algorithms secrecy should be revealed wide open to the public. Which principle is this?
Kerckhoffs’s Principle states that the security of a cryptographic system should not rely on the secrecy of the algorithm but rather on the secrecy of the cryptographic key. In other words, the design of a secure system should assume that the details of the cryptographic algorithm are known to attackers, and the strength of the system should primarily depend on keeping the cryptographic keys secret. This principle promotes transparency and the idea that a secure system should remain secure even if its algorithms are public knowledge.
5 / 15
5. Which characteristic guarantees a hash function won’t generate the same hashed value for two distinct messages?
The characteristic that guarantees a hash function won’t generate the same hashed value for two distinct messages is known as “collision resistance.” A hash function is collision-resistant if it is computationally infeasible to find two different inputs that produce the same hash output. In other words, collisions, where two different inputs map to the same hash value, are highly unlikely and difficult to intentionally create. Collision resistance is a crucial property for ensuring the security and reliability of hash functions in various cryptographic applications.
6 / 15
6. _______is a specific type of authentication code that involves a cryptographic hash function and a secret key. It uses the combination of the message and the secret key to generate a hash value, providing a way to verify both the integrity and authenticity of the message.
HMAC stands for “Keyed-Hash Message Authentication Code.” It is a cryptographic technique used to verify the integrity and authenticity of a message and provide message authentication. HMAC involves combining a cryptographic hash function (such as SHA-256 or SHA-512) with a secret key.
In HMAC, the original message is processed through the hash function along with a secret key. The result is a fixed-size hash value that represents the authenticity and integrity of the message. The secret key is known only to the sender and receiver, ensuring that only those with the key can generate or verify the HMAC.
HMAC is commonly used in various protocols and applications, including secure network communication (e.g., TLS/SSL), digital signatures, and message authentication in systems like HMAC-based One-Time Passwords (HOTP) and Token-based Authentication. By using HMAC, the receiver can verify that the message has not been tampered with and that it originated from a trusted sender.
7 / 15
7. Which of the following does HMAC not provides?
HMAC (Hashed Message Authentication Code) does not provide non-repudiation on its own. HMAC is primarily designed to ensure the integrity and authenticity of a message, but it does not address the issue of non-repudiation.
Non-repudiation is the assurance that the sender of a message cannot deny its origin or authenticity, and the recipient cannot deny receiving the message. Achieving non-repudiation typically involves the use of digital signatures and public-key cryptography. Digital signatures provide a way to verify the sender’s identity and ensure that the message has not been tampered with during transmission.
8 / 15
8. Which of the following are variants of SHA-2?
SHA-2 (Secure Hash Algorithm 2) has several variants based on the output size of the hash function.
The most common variants are:
Each variant provides a different level of security and is suitable for various applications depending on the desired hash length and cryptographic requirements.
9 / 15
9. When a digital signature is used correctly, it provides the recipient with proof that the message was sent by the specified sender even when it was sent over an unsecured channel. Which key is used to encrypt the message digest when using a digital signature?
The correct answer is Using sender’s private key.
When creating a digital signature, the sender’s private key is used to encrypt the message digest. This process allows the recipient to verify the signature using the sender’s public key. If the message digest can be successfully decrypted with the sender’s public key, it confirms that the signature was created by the holder of the corresponding private key (the sender), thus providing proof of the sender’s identity.
Here’s a brief overview of the other options:
10 / 15
10. In what way is the distribution of the public key regulated and organized to ensure sender identity for users?
The correct answer is Using a digital certificate.
A digital certificate is used to regulate and organize the distribution of public keys, ensuring the identity of the sender. It serves as a trusted third-party validation that associates a public key with a specific individual or entity. The digital certificate is issued by a Certificate Authority (CA), which verifies the identity of the requester before issuing the certificate. This helps establish trust in the public key being used for secure communications.
11 / 15
11. Alex uses his public key to encrypt his data, which he then saves on the cloud. Which one of the subsequent attack scenarios will compromise his data’s privacy?
Losing the private key can compromise encrypted data because the private key is essential for decrypting information encrypted with the corresponding public key. Without the private key, it becomes nearly impossible to access the original, unencrypted data. This highlights the critical importance of safeguarding private keys in cryptographic systems to maintain the confidentiality and security of encrypted information.
12 / 15
12. Which of the following PKI (Public Key Infrastructure) procedures makes sure that a certificate is still valid for a given operation and that a trust relationship is in place?
Digital certificate validation helps ensure the authenticity and integrity of public keys by verifying the certificate’s digital signature from a trusted Certificate Authority (CA). It confirms that the public key in the certificate belongs to the claimed owner and hasn’t been tampered with. Validating digital certificates is crucial for establishing trust in secure communication, preventing impersonation, and verifying the legitimacy of the public keys used in encryption.
13 / 15
13. Which of the following Secure Hashing Algorithms (SHA) is similar to the MD5 algorithm and generates a 160-bit digest from a message with a maximum length of (264-1) bits?
SHA-1 (Secure Hash Algorithm 1) works by taking an input message and producing a fixed-size (160-bit) hash value. It uses a series of bitwise operations, modular additions, and logical functions to process the input data in blocks and generate the final hash. SHA-1 is a cryptographic hash function designed to be a one-way function, meaning it should be computationally infeasible to reverse the process and derive the original input from the hash value.
14 / 15
14. Which one of the following hashing functions is no more recommended for use?
SHA-1 is not recommended for use due to vulnerabilities that make it susceptible to collision attacks. A collision occurs when two different inputs produce the same hash value. Advances in cryptanalysis have demonstrated that SHA-1’s security is compromised, making it feasible for attackers to create fraudulent certificates or documents with the same hash. As a result, cryptographic experts advise against using SHA-1 for security-sensitive applications and recommend transitioning to stronger hash functions, such as SHA-256 or SHA-3, to ensure better resistance against potential attacks.
15 / 15
15. What is the primary disadvantage of sharing sensitive data using the advanced encryption standard (AES) algorithm with a 256 bit key?
The primary disadvantage of using AES (Advanced Encryption Standard) with a large set of communicating parties is the key management complexity. As the number of parties increases, securely distributing and managing unique encryption keys for each pair of communicating parties becomes challenging. This can lead to logistical issues, increased overhead, and potential security risks if not managed carefully. Efficient key distribution mechanisms, such as hybrid encryption or key management protocols, are essential to address this challenge in large-scale communication scenarios.
Your score is
The average score is 0%
Restart Test
Related challenges :