Cryptography & PKI | Test-5
This section rigorously assesses the implementation of cryptographic controls and Public Key Infrastructure (PKI) within the system. It includes testing the use of secure and modern encryption algorithms, ensuring that cryptographic keys are generated, stored, and rotated securely, and evaluating key management procedures for compliance with industry standards. The section also examines the integrity of digital signatures, the correct usage of certificates, certificate authorities (CAs), and the strength of TLS/SSL configurations. It ensures that encryption is applied effectively for data in transit and at rest, safeguarding sensitive information and preventing unauthorized access or data breaches. Additionally, tests cover protocol security to prevent common vulnerabilities like weak ciphers, improper certificate validation, and man-in-the-middle (MITM) attacks.
1 / 16
1. Which protocol is used to digitally sign and encrypt emails?
S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for securing email messages by providing encryption and digital signatures. It allows users to send and receive signed and encrypted messages, ensuring the confidentiality, integrity, and authenticity of email communications. S/MIME uses digital certificates and public-key cryptography to achieve secure email communication.
2 / 16
2. Programs for cracking passwords work by reversing the hashing procedure.
Password cracking programs typically work by attempting to guess or recover the original plaintext password from its hashed form. Hashing is a one-way process, meaning it should be computationally infeasible to reverse the hash to obtain the original password directly
3 / 16
3. What does a cryptography “collision attack” mean?
Correct Answer: Using collision attacks we try to find two inputs producing the same hash.
A collision attack in cryptography is an attempt to find two different inputs that produce the same hash value. In hashing algorithms, a collision occurs when two distinct pieces of data result in the same hash output, which compromises the integrity of the hashing function. Collision attacks aim to exploit this weakness in a hashing algorithm.
Explanation of other options:
4 / 16
4. Which PKI mechanism enables instantaneous validation of a certificate’s validity?
The Online Certificate Status Protocol (OCSP) is a protocol that enables real-time checking of the revocation status of digital certificates. Instead of relying on periodic Certificate Revocation Lists (CRLs), OCSP allows systems to query a Certificate Authority (CA) or an OCSP responder to promptly verify if a specific certificate is still valid or has been revoked.
5 / 16
5. Paul wishes to send confidential messages to a competitor company. He secures these messages by concealing a secret message within an ordinary message. ‘Security through obscurity’ is the technique’s description. What method is Paul employing?
Steganography provides security through obscurity by hiding information within seemingly innocuous data, making it less likely to be detected or understood by those unaware of its presence. This covert method relies on keeping the existence of the hidden information obscure, adding a layer of security by making it challenging for adversaries to even recognize that secret data is being transmitted or stored. However, it’s important to note that security through obscurity is not a robust or recommended security practice on its own, and it should be complemented with strong cryptographic measures for a more reliable security solution.
6 / 16
6. What is the primary objective of a nonce in cryptographic protocols?
Correct Answer: Preventing replay attacks.
The primary objective of a nonce in cryptographic protocols is to prevent replay attacks. A nonce is a unique, randomly generated number used once within a session to ensure that a message or transaction cannot be reused or replayed by an attacker. Nonces help establish message freshness and uniqueness, making it harder for attackers to intercept and resend valid transmissions.
7 / 16
7. What does the term “chaining” refer to in the context of block ciphers?
In the context of block ciphers, “chaining” refers to using the output of one block’s encryption as the input for the next block, enhancing the security of the encryption process and preventing patterns in the encrypted data. This technique is commonly known as “block cipher chaining modes,” and it aims to add complexity and unpredictability to the encryption process.
8 / 16
8. Which expression satisfies the definition of digital signature?
Correct Answer: Digital Signature = Encrypt with private key(Hashing(message))
A digital signature is created by hashing the message and then encrypting the hash with the senderโs private key. This process ensures the integrity and authenticity of the message because only the sender (who owns the private key) could have created the signature, and any alteration of the message would result in a different hash value.
9 / 16
9. What is the main advantage of elliptic curve cryptography (ECC) over RSA?
Correct Answer: Higher encryption strength for shorter key sizes.
The main advantage of Elliptic Curve Cryptography (ECC) over RSA is that ECC provides higher encryption strength for shorter key sizes. This means that ECC can achieve the same level of security as RSA but with much smaller key sizes. As a result, ECC requires less computational power, memory, and bandwidth, making it more efficient and suitable for resource-constrained environments like mobile devices and IoT.
10 / 16
10. Which cryptographic algorithm is commonly used for secure key exchange in protocols like SSL/TLS?
Correct Answer: Diffie-Hellman
The Diffie-Hellman algorithm is commonly used for secure key exchange in protocols like SSL/TLS. It allows two parties to securely exchange cryptographic keys over a public channel without the keys themselves being transmitted, thus establishing a shared secret that can be used for encryption.
11 / 16
11. An attacker has obtained a target file encrypted via public key. Which of the following attacks is most likely to be used to crack the target file?
As he knows the public key he can encrypt the chosen-plain text and match with the encrypted file.
12 / 16
12. How does a timestamping server help to strengthen the validity of a digital signature?
A timestamping server strengthens the validity of a digital signature by providing a trusted and verifiable time reference. It ensures non-repudiation by proving that the signature existed at a specific time, making it difficult for the signer to deny the act of signing. Additionally, the timestamp helps maintain long-term integrity, allowing verification based on the cryptographic standards and keys valid at the time of signing, even if technology evolves or cryptographic methods become compromised.
13 / 16
13. Which one of the following levels of algorithms does Public Key Infrastructure (PKI) uses?
In short, RSA with a 2048-bit key length is recommended because it provides a higher level of security compared to shorter key lengths. As computing power increases, shorter key lengths become more susceptible to factorization attacks. A 2048-bit RSA key is currently considered secure against known cryptographic methods, offering a balance between security and computational efficiency. It is widely recommended for various cryptographic applications to withstand potential future advancements in attack capabilities.
14 / 16
14. Which cryptographic concept ensures that even if a long-term secret key is compromised, past communications remain secure?
Correct Answer: Perfect Forward Secrecy
Perfect Forward Secrecy (PFS) is a cryptographic concept that ensures that even if a long-term secret key (such as a server’s private key) is compromised, past communications remain secure. PFS achieves this by generating unique session keys for each communication session, which are not derived from the long-term key. Even if an attacker obtains the server’s private key, they would not be able to decrypt past sessions because the session keys are independent and ephemeral.
15 / 16
15. What does the term “key escrow” refer to in cryptographic systems?
In cryptographic systems, “key escrow” refers to the practice of storing copies of encryption keys with a third party, typically for purposes of access or recovery under specific conditions, such as legal or regulatory requirements.
16 / 16
16. Among the below statements, what is correct about digital signatures?
Correct Answer: A digital signature cannot be moved from one signed document to another because it is the hash of the original document encrypted with the private key of the signing party.
A digital signature is created by taking a hash of the document and encrypting that hash with the private key of the signing party. This binds the signature to the specific content of the document. If the document changes, the hash changes, and the digital signature becomes invalid for that modified document. Therefore, a digital signature is unique to each document and cannot be transferred to another document.
Your score is
The average score is 0%
Restart Test
Related challenges :