Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

answer the following, me and my classmates are doing a survey to see when it comes to correct answers what people tend to do when

answer the following, me and my classmates are doing a survey to see when it comes to correct answers what people tend to do when faced with alot of choices at the end. answer as correctly as possible after finishing of this count how many true and falses you had choosen and how many a,b,c,d choices was choosen.

Identify four qualities of good encryption algorithms.

Identify and briefly explain the four main residual risks to volume encryption keys.

Volume encryption provides no real protection against hostile users or _________

You must never encrypt two messages with the same key stream. To avoid this, OFB introduces an extra data item, the __________ or __________.

The strongest and most respected modern ciphers are __________.

In 2008, researchers at Princeton University demonstrated techniques to retrieve RAM contents after the computer had been powered off. They then extracted drive encryption keys from RAM and used them to decrypt an encrypted drive. This is called a __________.

In the 1970s, the __________ was the only organization in the U.S. government with cryptographic expertise.

The phrases below describe properties or functions of encryption technologies. Match the type of encryption with its property or function.

-A.B.C.

The principal weakness is its key size

-A.B.C.

Each encryption operation may use a separate 56-bit key

-A.B.C.

Performs 10 rounds when encrypting with a 128-bit key

A.

Rijndael

B.

DES

C.

Triple DES

You can clean data from a hard drive by:

A.

physically damaging the hard drive so it can't be read

B.

running a disk wipe program

C.

reformatting the hard drive

D.

deleting personal files and emptying the trash

Stream cipher modes include:

A.

counter

B.

cipher feedback (CFB)

C.

cipher block combining (CBC)

D.

output feedback (OFB)

Volume encryption risks include:

A.

untrustworthy encryption

B.

theft leaves data unprotected

C.

leaking the plaintext

D.

data copied to removable storage is unprotected

Encryption can help protect volumes in the following situations except:

A.

when a storage device is lost or stolen

B.

when discarding a hard drive or other device without wiping it

C.

to prevent physical damage to a hard drive

D.

when an eavesdropper looks at the volume without the operating system in place

Access control protects data on a computer against:

A.

hostile users

B.

theft

C.

Trojans

D.

recycling

File encryption protects data on a computer against the following except:

A.

hostile users

B.

Trojan crypto

C.

theft

D.

Trojans

When encrypting data with a block cipher, each repetition is called:

A.

a key schedule

B.

a run

C.

a round

D.

a key expansion

The following are best practices or proper recommendations for choosing an encryption algorithm except:

A.

check recent news and research results in the crypto community

B.

use evaluated cryptographic products if using a certified algorithm

C.

do not use private label algorithms that have not been published and reviewed by the cryptographic community

D.

use DES if at all possible

A self-encrypting drive locks data on the hard disk by:

A.

erasing the encryption key when the drive is unplugged or reset

B.

none of the answers

C.

changing the encryption algorithm after encrypting data

D.

prompting for the encryption key whenever data is accessed

The following are properties of persistent key storage except:

A.

it uses nonvolatile storage

B.

it can wrap the key using a passphrase

C.

it can store the key on a removable storage device

D.

it uses volatile storage

There are four strategies for cleaning a hard drive of personal date. Which one will actually make the data un-recoverable?

A.

Reformat the hard drive.

B.

Reinstall the Operating system.

C.

Delete personal files and empty the trash.

D.

Run a disk wipe program.

AES supports exactly which three key sizes?

A.

32 bits, 64 bits, 128 bits

B.

128 bits, 192 bits, and 256 bits.

C.

64 bits, 128 bits, and 256 bits.

D.

8 bits, 16 bits, 32 bits,

The counter value must be unique for every 128-bit block on the device. To do this, the counter incorporates the sector number and the block's index number within the sector. What are they?

A.

All of the answers

B.

The counter's low-order digits select a single block within the sector. There are 32 blocks of 128 bits each in a standard sector containing 512 bytes. We assign the five lowest bits in the counter to select a block within the sector.

C.

The middle digits in the counter select the sector on the hard drive

D.

The remaining high-order digits in the counter will contain a nonce that remains constant for all sectors on the hard drive.

We reduce the risk of untrustworthy encryption by using certified products. In the United States, the recognized certification is FIPS

A.

140-4

B.

140-2

C.

142-1

D.

160-8

After the volume encryption product implements its protections. What are some the risks remaining?

A.

All of the answers

B.

Intercepted keys

C.

Recycled CEK attack

D.

Intercepted passphrase

What are three general risks we address with volume encryption?

A.

Losing the storage device

B.

An eavesdropper that looks at the volume without the operating system in place

C.

Discarding a hard drive or other device without wiping it

D.

All the Answers

The underlying code of the Rijndael algorithm was leaked to the public in 1994, allowing for successful attacks against data encrypted with Rijndael.

True

False

Changing a single bit of a block cipher's input affects the entire output block.

True

False

A tweakable cipher includes a third input, a nonce-like value that modifies the encryption without the cost of changing the encryption key.

True

False

Counter mode and cipher block chaining (CBC) produce tweakable cipher modes.

True

False

Drive encryption makes it very easy to recycle the drivE) The owner directs the controller to purge itself of every copy of the current encryption key and of the associated nonces and IVs. Once finished, there is no practical way to decrypt any data on the hard drive.

True

False

To disable or bypass the encryption, attackers would need to attack the driver controller circuitry. Integrity risks may arise if the hardware relies on firmware and the firmware may be updated.

True

False

Key wrapping provides a simple, general-purpose approach for storing and protecting persistent key storage.

True

False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Samsung Galaxy S23 Ultra Comprehensive User Manual

Authors: Leo Scott

1st Edition

B0BVPBJK5Q, 979-8377286455

More Books

Students also viewed these Databases questions