Exam 8: Secure Programming With C and Openssl
As part of a shell program or batch program, OpenSSL commands are usually run in interactive mode.
False
What is the core path for hashing with EVP API?
The core path for hashing with EVP API is as follows:
* EVP_get_digestbyname( ) : Obtain algorithm type by algorithm name. Supported name strings are MD2, MD4, MD5, MDC2, SHA1, DSS1, and RIPEMD. Both SHA1 and DSS1 are implementations of the SHA1 algorithm.
* EVP_DigestInit( , type) : Initialize context according to the algorithm type.
* EVP_DigestUpdate( , , ) : Adding data for computation from inputValue with length inputLength to the context.
* EVP_DigestFinal( , , ) : Create the hash, also called message digest, from the context, output the result to outputValue, and result length to outputLength.
Briefly describe DES and its variants.
The data encryption standard (DES), dating back to 1976, is a cipher selected as an official federal information processing standard (FIPS) for the United States. It is certainly the most widely used cipher internationally. It uses fixed 64-bit blocks and 64-bit keys with 8- bits parity. The 54-bit key (64 - 8) is generally considered too small, and some DES keys have been broken in less than 24 hours. Most DES users now use Triple DES (3DES). In 3DES, data is encrypted with DES to produce ciphertext, and then a second key is used to "decrypt" the ciphertext. Finally, the data is encrypted again with either the original key (two-key 3DES) or with a third key (three-key 3DES). 3DES is secure but slow. A quicker alternative is DES-X, which increases the key size by XORing extra key material before and after DES.
____ encoding is very useful when binary data needs to transfer correctly among platforms with different code pages over the Internet.
Buffer overflow provides the ability to overwrite a return address causing ____.
The OpenSSL command-line tool executable is called ____ on UNIX.
The ____ option in the ca command is used to generate the CRL.
One common buffer overflow attack is called the ____________________, where the target is to overwrite internal data of a program.
____ is a block cipher designed by Xuejia Lai and James L. Massey in 1991.
OpenSSL provides a single API set that serves as an interface to all hashing and symmetric cryptography algorithms: the ____ interface.
A ____ cipher is a symmetric cipher in which the input digits are encrypted one at a time.
OpenSSL contains a minimal CA application that ships with the toolkit.
____ is a symmetric block cipher designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms.
C is "close to the machine," as the abstractions the language introduced are readily grounded in the concrete data types and operations supplied by conventional computers
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)