Answers
This section contains the answers to the exercises and the Chapter review section in this chapter.
Exercise 3-1
Following is the list of cryptographic ciphers implemented by the TrueCrypt v7.1 application:
AES
Serpent
Twofish
Combination of these
Following is the list of hashing algorithms implemented by the TrueCrypt v7.1 application:
RIPEMD-160
SHA512
Whirlpool
NOTE: A different version of the TrueCrypt application might implement different algorithms.
Exercise 3-2
Following are examples of three certificates that might be found in the Trusted Root Certification Authorities store on a computer system.
Entrust.net Certification Authority (2048):
Signature cryptographic algorithm: RSA
Signature hashing algorithm: SHA1
Public key algorithm: RSA
Public key ...
Get CISSP Training Kit now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.