Which of the following is an extension of the Diffie-Hellman key exchange into a complete discrete logarithm cryptosystem, allowing for tasks like general encryption?
Security+ Lesson 3

Quiz
•
Computers
•
Professional Development
•
Hard

Alejandro Hidalgo
FREE Resource
6 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
RIPEMD
RSA
MD5
ElGamal
Answer explanation
ElGamal is an extension of the Diffie-Hellman key exchange designed by Taher Elgamal in 1985. It extends DH into a complete discrete logarithm cryptosystem, allowing for tasks like general encryption. Elgamal released his technique into the public domain, while at the time, RSA was proprietary, so the royalty-free nature gained its popularity. One disadvantage is that it generates ciphertext twice as long as the plaintext, so it increases the consumption of storage and bandwidth.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the correct sequence of encryption ciphers from the weakest to the strongest?
DES > 3DES > Blowfish > AES
DES > Blowfish > AES > 3DES
3DES > DES > AES > Blowfish
3DES > DES > Blowfish > AES
Answer explanation
The correct sequence of encryption ciphers from the weakest to the strongest is as follows:
1 - Data Encryption Standard (DES)
2 - TripleDES (3DES)
3 - Blowfish
4 - Advanced Encryption Standard (AES)
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Which of the following is a certificate backed by a stricter identity validation process than the CA’s default?
Extended Validation
Domain validation
Machine authentication
Answer explanation
Extended Validation (EV) is a certificate backed by a stricter identity validation process than the CA’s default. It provides the highest available level of assurance. The CA issuing an EV certificate certifies that they have verified the identity and authenticity of the certificate subject. For SSL certificates used on the web, sites with a valid EV certificate show a distinct green color in the browser’s address bar. Generally, an EV certificate cannot also be a wildcard, but it might be multi-domain.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of cryptography is best suited for key generation?
Hashing
One-Time Pad
Symmetric encryption
Asymmetric encryption
Answer explanation
Since the output of a cryptographic hash is pseudorandom, it can be used anywhere pseudorandom data of a fixed length is desired. For example, you can securely generate a new key by hashing an existing key, arbitrary data, or some combination of the two. Hashing is particularly valuable for creating cryptographic keys from passwords created by humans. Since these passwords are often shorter and less random than modern keys, it’s a good idea to add a key stretching algorithm that makes brute force decryption more difficult.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a NIST standard that uses a discrete logarithm and is faster for data encryption and signature verification?
DSA
DH
HMAC
ECC
Answer explanation
Digital Signature Algorithm (DSA) is created by a former NSA employee in 1991 and soon adopted as a NIST standard. It uses a different one-way problem called a discrete logarithm. It is similar in overall strength to RSA at the same key length, but different in performance. DSA allows faster key generation and decryption and RSA is faster for data encryption and signature verification. RSA is more popular, and current DSA standards require 1024-bit keys, which are no longer considered secure.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following makes the mathematical relationship between the plaintext and the key as complex as possible, so that a partially correct key is useless to an attacker?
Transposition
Confusion
Diffusion
One-Time Pad
Answer explanation
Confusion makes the mathematical relationship between the plaintext and the key as complex as possible, so that a partially correct key is useless to an attacker. Every bit or character of the plaintext should be acted upon by more than one bit or character of the key. In a cipher with very strong confusion, changing a single bit of the key might change half the bits of the entire ciphertext.
Similar Resources on Quizizz
10 questions
Startup - Value Proposition Canvas

Quiz
•
University - Professi...
10 questions
IT ENGLISH: Research Project Topics - Secure Coding Practices

Quiz
•
Professional Development
10 questions
Style Guide Training

Quiz
•
Professional Development
10 questions
Bedrock Quiz 1 - NAMER - GenAI - Enablement

Quiz
•
Professional Development
5 questions
Challenges Walkthrough Quiz

Quiz
•
Professional Development
10 questions
Web application security

Quiz
•
Professional Development
10 questions
Securing Source Code

Quiz
•
Professional Development
10 questions
Blockchain

Quiz
•
5th Grade - Professio...
Popular Resources on Quizizz
10 questions
Chains by Laurie Halse Anderson Chapters 1-3 Quiz

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
15 questions
Character Analysis

Quiz
•
4th Grade
12 questions
Multiplying Fractions

Quiz
•
6th Grade
30 questions
Biology Regents Review #1

Quiz
•
9th Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
50 questions
Biology Regents Review: Structure & Function

Quiz
•
9th - 12th Grade