O'Reilly logo

CISSP Training Kit by David R. Miller

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Answers

This section contains the answers to the exercises and the Chapter review section in this chapter.

Exercise 3-1

Following is the list of cryptographic ciphers implemented by the TrueCrypt v7.1 application:

  • AES

  • Serpent

  • Twofish

  • Combination of these

Following is the list of hashing algorithms implemented by the TrueCrypt v7.1 application:

  • RIPEMD-160

  • SHA512

  • Whirlpool

NOTE: A different version of the TrueCrypt application might implement different algorithms.

Exercise 3-2

Following are examples of three certificates that might be found in the Trusted Root Certification Authorities store on a computer system.

  • Entrust.net Certification Authority (2048):

    • Signature cryptographic algorithm: RSA

    • Signature hashing algorithm: SHA1

    • Public key algorithm: RSA

    • Public key ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required