Eccouncil Certified Encryption Specialist 212-81 ECES Exam Practice Test

Page: 1 / 14
Total 206 questions
Question 1

In a ______ the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.



Answer : B

Global deduction

https://en.wikipedia.org/wiki/Cryptanalysis

Global deduction --- the attacker discovers a functionally equivalent algorithm for encryption and decryption, but without learning the key.

Incorrect answers:

Instance (local) deduction --- the attacker discovers additional plaintexts (or ciphertexts) not previously known.

Information deduction --- the attacker gains some Shannon information about plaintexts (or ciphertexts) not previously known.

Total break --- the attacker deduces the secret key.


Question 2

Which of the following is a type of encryption that has two different keys. One key can encrypt the message and the other key can only decrypt it?



Answer : B

Asymmetric

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys, which may be disseminated widely, and private keys, which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security.

Incorrect answers:

Symmetric - Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

Block cipher - A block cipher is a deterministic algorithm operating on fixed-length groups of bits, called blocks. It uses an unvarying transformation, that is, it uses a symmetric key.

Stream cipher - A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream.


Question 3

A linear congruential generator is an example of what?



Answer : C

A pseudo random number generator

https://en.wikipedia.org/wiki/Linear_congruential_generator

A linear congruential generator (LCG) is an algorithm that yields a sequence of pseudo-randomized numbers calculated with a discontinuous piecewise linear equation. The method represents one of the oldest and best-known pseudorandom number generator algorithms. The theory behind them is relatively easy to understand, and they are easily implemented and fast, especially on computer hardware which can provide modular arithmetic by storage-bit truncation.


Question 4

How did the ATBASH cipher work?



Answer : A

By substituting each letter for the letter from the opposite end of the alphabet (i.e. A becomes Z, B becomes Y, etc.)

https://en.wikipedia.org/wiki/Atbash

The Atbash cipher is a particular type of monoalphabetic cipher formed by taking the alphabet (or abjad, syllabary, etc.) and mapping it to its reverse, so that the first letter becomes the last letter, the second letter becomes the second to last letter, and so on.


Question 5

What is the basis for the difficulty in breaking RSA?



Answer : D

Factoring numbers

https://en.wikipedia.org/wiki/RSA_(cryptosystem)

RSA (Rivest--Shamir--Adleman) is a public-key cryptosystem that is widely used for secure data transmission. It is also one of the oldest. The acronym RSA comes from the surnames of Ron Rivest, Adi Shamir, and Leonard Adleman, who publicly described the algorithm in 1977. An equivalent system was developed secretly, in 1973 at GCHQ (the British signals intelligence agency), by the English mathematician Clifford Cocks. That system was declassified in 1997.

In a public-key cryptosystem, the encryption key is public and distinct from the decryption key, which is kept secret (private). An RSA user creates and publishes a public key based on two large prime numbers, along with an auxiliary value. The prime numbers are kept secret. Messages can be encrypted by anyone, via the public key, but can only be decoded by someone who knows the prime numbers.


Question 6

What size key does Skipjack use?



Answer : C


Question 7

John is trying to explain the basics of cryptography to a group of young, novice, security students. Which one of the following most accurately defines encryption?



Answer : D

Changing a message so it can only be easily read by the intended recipient

https://en.wikipedia.org/wiki/Encryption

Encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can decipher a ciphertext back to plaintext and access the original information. Encryption does not itself prevent interference but denies the intelligible content to a would-be interceptor.


Page:    1 / 14   
Total 206 questions