Page 568 - StudyBook.pdf
P. 568

552    Chapter 9 • Basis of Cryptography

                 underground had no difficulty in leveraging these keys to develop the CSS pro-
                 gram, which allows data copied off of the DVD to be saved to another media
                 in an unencrypted format. Ultimately, the CSS scheme was doomed to failure.
                 You can’t put a key inside millions of DVD players, distribute them, and not
                 expect someone to eventually pull it out.


             Self Test



             A Quick Answer Key follows the Self Test questions. For complete questions,
             answers, and explanations to the Self Test questions in this chapter as well as
             the other chapters in this book, see the Self Test Appendix.


             Algorithm Questions



             1. You have selected to use 3DES as the encryption algorithm for your company’s
                 Virtual Private Network (VPN).Which of the following statements about
                 3DES are true?

                 A. 3DES requires significantly more calculation than most other algorithms.
                 B. 3DES is vulnerable to brute-force attacks.
                 C 3DES is an example of a symmetric algorithm.
                 D 3DES can be broken in only a few days using state-of-the-art techniques.


             2. What is the purpose of a hash algorithm? (Select all that apply)
                 A. To encrypt e-mail.
                 B. To encrypt short phrases in a one-way fashion.

                 C. To create a secure checksum.
                 D. To obscure an identity.

             3. Widgets GmbH is a German defense contractor.What algorithms are they most
                 likely to use to secure their VPN connections? (Choose all that apply).
                 A. 3DES

                 B. El Gamal
                 C. AES

                 D. IDEA

          www.syngress.com
   563   564   565   566   567   568   569   570   571   572   573