Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ECCouncil 212-81 - EC-Council Certified Encryption Specialist (ECES)

Page: 1 / 7
Total 206 questions

Collision resistance is an important property for any hashing algorithm. Joan wants to find a cryptographic hash that has strong collision resistance. Which one of the following is the most collisionresistant?

A.

SHA2

B.

MD5

C.

MD4

D.

PIKE

A 160-bit hash algorithm developed by Hans Dobbertin, Antoon Bosselaers, and Bart Preneel for which there are 128, 256 and 320-bit versions is called what?

A.

SHA1

B.

MD5

C.

FORK

D.

RIPEMD

Hash algortihm created by the Russians. Produces a fixed length output of 256bits. Input message is broken up into 256 bit blocks. If block is less than 256 bits then it is padded with 0s.

A.

TIGER

B.

GOST

C.

BEAR

D.

FORK-256

If you use substitution alone, what weakness is present in the resulting cipher text?

A.

It is the same length as the original text

B.

It is easily broken with modern computers

C.

It maintains letter and word frequency

D.

It is too simple

A type of frequency analysis used to attack polyalphabetic substitution ciphers. It's used to try to discover patterns and use that information to decrypt the cipher.

A.

Kasiski Method

B.

Birthday Attack

C.

Information Deduction

D.

Integral Cryptanalysis

In which of the following password protection technique, random strings of characters are added to the password before calculating their hashes?

A.

Keyed Hashing

B.

Double Hashing

C.

Salting

D.

Key Stretching

Asymmetric encryption method developed in 1984. It is used in PGP implementations and GNU Privacy Guard Software. Consists of 3 parts: key generator, encryption algorithm, and decryption algorithm.

A.

Tiger

B.

GOST

C.

RIPEMD

D.

ElGamal

A simple algorithm that will take the initial key and from that generate a slightly different key each round.

A.

Key Schedule

B.

Feistel Network

C.

SHA-2

D.

Diffie-Helman

What size block does Skipjack use?

A.

64

B.

512

C.

128

D.

256

Which one of the following best describes a process that splits the block of plaintext into two separate blocks, then applies the round function to one half, and finally swaps the two halves?

A.

Block ciphers

B.

Symmetric cryptography

C.

Feistel cipher

D.

Substitution cipher