Answers

This section contains the answers to the exercises and the Chapter review section in this chapter.

Exercise 3-1

Following is the list of cryptographic ciphers implemented by the TrueCrypt v7.1 application:

  • AES

  • Serpent

  • Twofish

  • Combination of these

Following is the list of hashing algorithms implemented by the TrueCrypt v7.1 application:

  • RIPEMD-160

  • SHA512

  • Whirlpool

NOTE: A different version of the TrueCrypt application might implement different algorithms.

Exercise 3-2

Following are examples of three certificates that might be found in the Trusted Root Certification Authorities store on a computer system.

  • Entrust.net Certification Authority (2048):

    • Signature cryptographic algorithm: RSA

    • Signature hashing algorithm: SHA1

    • Public key algorithm: RSA

    • Public key ...

Get CISSP Training Kit now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.