๐Ÿ›ก️ Test question: Understanding Cryptographic Algorithms for Internet Security

๐Ÿ›ก️ Understanding Cryptographic Algorithms for Internet Security

(CISSP Domain 3: Security Architecture and Engineering)


๐Ÿงช CISSP Practice Question

Which of the following is a cryptographic algorithm that is commonly used for secure communications over the internet?
A: RSA ✅
B: Blowfish
C: Triple DES
D: AES ❌


✅ Correct Answer: A — RSA

CISSP Domain 3: Security Architecture and Engineering

RSA (Rivest-Shamir-Adleman) is an asymmetric cryptographic algorithm used extensively in secure communications, particularly within:

  • TLS/SSL protocols

  • Public key infrastructure (PKI)

  • Digital signatures and certificates

RSA enables the secure exchange of symmetric keys between a client and server, which is the backbone of how secure sessions are established on the internet (e.g., HTTPS).

๐Ÿ”‘ In CISSP terms, RSA supports the confidentiality, integrity, and authentication pillars of cryptographic design.


❌ Why the Other Options Are Incorrect

B: Blowfish

CISSP Domain 3

  • Symmetric cipher

  • Designed in the 1990s

  • 64-bit block size, making it susceptible to modern attacks

  • Largely replaced by AES and not typically used in internet protocols anymore

C: Triple DES (3DES)

CISSP Domain 3

  • Based on DES, applying encryption three times

  • Slow and less secure due to small 64-bit block size

  • Deprecated by NIST, scheduled for full disallowance in federal systems

D: AES

CISSP Domain 3

  • Symmetric algorithm

  • Used for bulk data encryption after a secure session is established

  • Not typically used for key exchange, which is what the question focuses on


๐Ÿง  Domain 3: Key CISSP Concepts Reinforced

Concept Explanation
Asymmetric vs. Symmetric RSA (asymmetric) is used to securely exchange keys; AES (symmetric) is used for fast, ongoing encryption.
TLS/SSL TLS uses RSA or Diffie-Hellman for key exchange and AES for encryption.
Cryptographic Lifecycle Knowing when to use each type of crypto is essential for system design and risk mitigation.

✍️ Memory Hack

๐Ÿ” RSA = "Really Secure Access" — use it to start a secure conversation
๐Ÿ”’ AES = "Already Established Session" — used after the handshake


๐Ÿ“š CISSP Domain Reference Summary

  • Domain 3: Security Architecture and Engineering
    Covers the design, implementation, and management of secure architectures including cryptographic systems and protocols.


Would you like me to generate a few quiz questions to follow this blog post, or should I prep it in HTML for direct copy-paste to Blogger?

Comments

Popular posts from this blog

๐Ÿงญ CISSP Study Note: Guidelines

๐Ÿ’ธ CISSP Study Note: Risk Transference

๐Ÿ“ CISSP Study Note: Standards