[CCCure CISSP] Qs8 Cryptography: cccure QuizEngn doubts

classic Classic list List threaded Threaded
2 messages Options
Reply | Threaded
Open this post in threaded view
|

[CCCure CISSP] Qs8 Cryptography: cccure QuizEngn doubts

Amlan Deb
Hello everyone,
 
I have some doubts regarding some cccure Quiz questions and concepts mentioned below. Would really appreciate it if you could take out some time and help me with them. Request you to please provide a quick reply as I need to appear for the exam in the month of July.
 
Thanks,
Amlan

Doubt#8
========

35. 

1.     Question: 285 | Difficulty: 3/5 | Relevancy: 3/3

In a known plaintext attack, the cryptanalyst has knowledge of which of the following?

o      the ciphertext and the key

o      the plaintext and the secret key

o     both the plaintext and the associated ciphertext of several messages

o      the plaintext and the algorithm

You did not provide any answer to this question. Please review details below.

In a known plaintext attack, the attacker has the plaintext and ciphertext of one or more messages. The goal is to discover the key used to encrypt the messages so that other messages can be deciphered and read.
Source: HARRIS, Shon,
All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 3rd Ed., chapter 8: Cryptography (page 676).  Also check out: Handbook of Applied Cryptography 4th Edition by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone.

Edit July 9, 2007 by Mike Young, CISSP

Contributor: Mike Yeatman

Covered topic: <A title="Cryptography attacks and countermeasures - Cryptography is the mathematical science that deals with transforming data to render its meaning unintelligible, prevent its undetected alteration, or prevent its unauthorized use. Different types of attacks that" href="javascript:void(0)">Cryptography attacks and countermeasures

 

My doubt:  Please explain why option ‘D’ cannot be the answer?

 

_______________________________________________
You can find the list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org
Reply | Threaded
Open this post in threaded view
|

Re: [CCCure CISSP] Qs8 Cryptography: cccure QuizEngn doubts

Stephens
Amlan,

In a known-plaintext attack the attacker has the plaintext and ciphetext. The attacker needs the actual key (algorithm enclosed) for future attacks that require the need to decipher the PT.

Timothy Stephens
Network IT Essentials
Mobile: (706) 550-4008
Office: (915) 485-7695

On Jun 2, 2013, at 2:27 PM, Amlan Deb <[hidden email]> wrote:

Hello everyone,
 
I have some doubts regarding some cccure Quiz questions and concepts mentioned below. Would really appreciate it if you could take out some time and help me with them. Request you to please provide a quick reply as I need to appear for the exam in the month of July.
 
Thanks,
Amlan

Doubt#8
========

35. 

1.     Question: 285 | Difficulty: 3/5 | Relevancy: 3/3

In a known plaintext attack, the cryptanalyst has knowledge of which of the following?

o      the ciphertext and the key

o      the plaintext and the secret key

o     both the plaintext and the associated ciphertext of several messages

o      the plaintext and the algorithm

You did not provide any answer to this question. Please review details below.

In a known plaintext attack, the attacker has the plaintext and ciphertext of one or more messages. The goal is to discover the key used to encrypt the messages so that other messages can be deciphered and read.
Source: HARRIS, Shon,
All-In-One CISSP Certification Exam Guide, McGraw-Hill/Osborne, 3rd Ed., chapter 8: Cryptography (page 676).  Also check out: Handbook of Applied Cryptography 4th Edition by Alfred J. Menezes, Paul C. van Oorschot and Scott A. Vanstone.

Edit July 9, 2007 by Mike Young, CISSP

Contributor: Mike Yeatman

Covered topic: <a title="Cryptography attacks and countermeasures - Cryptography is the mathematical science that deals with transforming data to render its meaning unintelligible, prevent its undetected alteration, or prevent its unauthorized use. Different types of attacks that" href="javascript:void(0)">Cryptography attacks and countermeasures

 

My doubt:  Please explain why option ‘D’ cannot be the answer?

 
_______________________________________________
You can find the list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org

_______________________________________________
You can find the list archive at:
http://cissp-study.3965.n7.nabble.com/

CISSPstudy mailing list
[hidden email]

To UNSUBSCRIBE, SUBSCRIBE, or MANAGE your accout visit the link below:
http://cccure.org/mailman/listinfo/cisspstudy_cccure.org