Answers

This section contains the answers to the exercises and the Chapter review section in this chapter.

Exercise 3-1

Following is the list of cryptographic ciphers implemented by the TrueCrypt v7.1 application:

  • AES

  • Serpent

  • Twofish

  • Combination of these

Following is the list of hashing algorithms implemented by the TrueCrypt v7.1 application:

  • RIPEMD-160

  • SHA512

  • Whirlpool

NOTE: A different version of the TrueCrypt application might implement different algorithms.

Exercise 3-2

Following are examples of three certificates that might be found in the Trusted Root Certification Authorities store on a computer system.

  • Entrust.net Certification Authority (2048):

    • Signature cryptographic algorithm: RSA

    • Signature hashing algorithm: SHA1

    • Public key algorithm: RSA

    • Public key ...

Get CISSP Training Kit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.