Deck 8: Secure Programming With C and Openssl

Full screen (f)
exit full mode
Question
3)The strlen function should only be used when '\0' terminated string is guaranteed.
Use Space or
up arrow
down arrow
to flip the card.
Question
12)Certificate revocation is done in OpenSSL by using the ca command with the -____ option.

A) remove
B) retire
C) revoke
D) crl
Question
6)C/C++ developers must do their own memory management using the standard APIs malloc(), alloc(), realloc(), free(), new() and ____ .

A) delete()
B) remove()
C) revoke()
D) erase()
Question
15)____ encoding is very useful when binary data needs to transfer correctly among platforms with different code pages over the Internet.

A) Base64
B) SHA1
C) MD5
D) RC4
Question
1)C is "close to the machine," as the abstractions the language introduced are readily grounded in the concrete data types and operations supplied by conventional computers
Question
4)As part of a shell program or batch program, OpenSSL commands are usually run in interactive mode.
Question
9)The OpenSSL command-line tool executable is called ____ on UNIX.

A) openssl.exe
B) openssl
C) cmdssl
D) opensslcmd
Question
20)____ is a popular software program that uses encryption techniques to encrypt and digitally sign e-mail.

A) PKCS
B) EVP
C) PGP
D) FIPS
Question
17)OpenSSL provides the APIs ____ for Base64 decoding.

A) EVP_DecodeBase64
B) EVP_B64Decode
C) EVP_Base64DecodeBlock
D) EVP_DecodeBlock
Question
2)Totally strong type checking is possible to achieve.
Question
19)____ is a symmetric block cipher designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms.

A) IDEA
B) AES
C) RC5
D) Blowfish
Question
11)The ____ command is a PKCS#10 certificate request and certificate generating utility.

A) cert
B) req
C) pkcs
D) pkcsreq
Question
14)OpenSSL provides a single API set that serves as an interface to all hashing and symmetric cryptography algorithms: the ____ interface.

A) SSL
B) EVP
C) Crypt
D) Security
Question
8)Buffer overflow provides the ability to overwrite a return address causing ____.

A) heap overruns
B) variable overruns
C) stack overruns
D) variable smashing
Question
7)A language is ____ typed if it enforces type abstractions where operations can be applied only to objects of the appropriate type.

A) weakly
B) virtually
C) securely
D) strongly
Question
5)OpenSSL contains a minimal CA application that ships with the toolkit.
Question
16)OpenSSL provides the APIs ____ for Base64 encoding.

A) EVP_B64EncodeBlock
B) EVP_Base64EncodeBlock
C) EVP_EncodeBlock
D) EVP_Base64Block
Question
13)The ____ option in the ca command is used to generate the CRL.

A) -gencrl
B) -crl
C) -revoke
D) -crlcert
Question
10)The OpenSSL command-line tool executable is called ____ on Windows.

A) openssl.bat
B) openssl.com
C) cmdssl.exe
D) openssl.exe
Question
18)____ is a symmetric key-encryption technique that will replace the commonly used DES standard.

A) AES
B) RC2
C) IDEA
D) Blowfish
Question
25)The standard organization ____ has been developing a standard for transport layer security based on SSL, and the result is TLS version 1.

A) IEFT
B) ACM
C) OSI
D) IEEE
Question
33)Why is it hard to write secure code with C?
Question
22)A ____ cipher is a symmetric cipher in which the input digits are encrypted one at a time.

A) block
B) group
C) bit
D) stream
Question
34)What causes a buffer overflow?
Question
29)____________________ is a specific type of stack overrun attack where the goal is to overwrite the return address of subroutines on the stack.
Question
28)One common buffer overflow attack is called the ____________________, where the target is to overwrite internal data of a program.
Question
35)Why are most high-level programming languages essentially immune to buffer overflow problems?
Question
36)Describe the memory arrangement of a C program.
Question
24)____ is a protocol that provides a secure channel between two systems.

A) AES
B) FIPS
C) SSL
D) EVP
Question
31)____________________ is the mathematical process that produces the message digest or "hash."
Question
37)What is the general algorithm for a stack overrun attack?
Question
39)How can you revoke a certificate in OpenSSL?
Question
38)Describe the structure of a configuration file for OpenSSL.
Question
40)How does hashing work?
Question
26)____ are usually used in conjunction with nonsecret parameters to derive one or more keys from a common secret value.

A) TLS
B) EVPs
C) KDFs
D) MACs
Question
30)The open source toolkit ____________________ is the de facto standard library for full-feature cryptography and SSL implementation for use with the C programming languages.
Question
21)____ is a block cipher designed by Xuejia Lai and James L. Massey in 1991.

A) AES
B) IDEA
C) Blowfish
D) RC4
Question
27)____________________ helps to insure the security and portability of the code, and it usually requires that the programmer explicitly define the types of each object in a program.
Question
41)What is the core path for hashing with EVP API?
Question
23)Most block ciphers are constructed by composing several simpler functions. These ciphers are called iterated block ciphers or ____ ciphers.

A) hybrid
B) product
C) stream
D) group
Question
Match between columns
detect any attempt to run illegal code on the stack
Buffer overflow
detect any attempt to run illegal code on the stack
Library-based defenses
detect any attempt to run illegal code on the stack
Base64
detect any attempt to run illegal code on the stack
AES
detect any attempt to run illegal code on the stack
C
detect any attempt to run illegal code on the stack
Stack
detect any attempt to run illegal code on the stack
Electric Fence
detect any attempt to run illegal code on the stack
Heap
detect any attempt to run illegal code on the stack
GCC
an extremely common security flaw in C/C++
Buffer overflow
an extremely common security flaw in C/C++
Library-based defenses
an extremely common security flaw in C/C++
Base64
an extremely common security flaw in C/C++
AES
an extremely common security flaw in C/C++
C
an extremely common security flaw in C/C++
Stack
an extremely common security flaw in C/C++
Electric Fence
an extremely common security flaw in C/C++
Heap
an extremely common security flaw in C/C++
GCC
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Buffer overflow
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Library-based defenses
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Base64
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
AES
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
C
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Stack
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Electric Fence
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Heap
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
GCC
a set of programming language compilers produced by the GNU Project
Buffer overflow
a set of programming language compilers produced by the GNU Project
Library-based defenses
a set of programming language compilers produced by the GNU Project
Base64
a set of programming language compilers produced by the GNU Project
AES
a set of programming language compilers produced by the GNU Project
C
a set of programming language compilers produced by the GNU Project
Stack
a set of programming language compilers produced by the GNU Project
Electric Fence
a set of programming language compilers produced by the GNU Project
Heap
a set of programming language compilers produced by the GNU Project
GCC
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Buffer overflow
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Library-based defenses
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Base64
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
AES
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
C
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Stack
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Electric Fence
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Heap
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
GCC
holds all dynamic variables allocated by malloc() and the new operator
Buffer overflow
holds all dynamic variables allocated by malloc() and the new operator
Library-based defenses
holds all dynamic variables allocated by malloc() and the new operator
Base64
holds all dynamic variables allocated by malloc() and the new operator
AES
holds all dynamic variables allocated by malloc() and the new operator
C
holds all dynamic variables allocated by malloc() and the new operator
Stack
holds all dynamic variables allocated by malloc() and the new operator
Electric Fence
holds all dynamic variables allocated by malloc() and the new operator
Heap
holds all dynamic variables allocated by malloc() and the new operator
GCC
used to store program state such as procedure arguments, local variables, and register values
Buffer overflow
used to store program state such as procedure arguments, local variables, and register values
Library-based defenses
used to store program state such as procedure arguments, local variables, and register values
Base64
used to store program state such as procedure arguments, local variables, and register values
AES
used to store program state such as procedure arguments, local variables, and register values
C
used to store program state such as procedure arguments, local variables, and register values
Stack
used to store program state such as procedure arguments, local variables, and register values
Electric Fence
used to store program state such as procedure arguments, local variables, and register values
Heap
used to store program state such as procedure arguments, local variables, and register values
GCC
used as a tool to write software programs that interact well with the operating system
Buffer overflow
used as a tool to write software programs that interact well with the operating system
Library-based defenses
used as a tool to write software programs that interact well with the operating system
Base64
used as a tool to write software programs that interact well with the operating system
AES
used as a tool to write software programs that interact well with the operating system
C
used as a tool to write software programs that interact well with the operating system
Stack
used as a tool to write software programs that interact well with the operating system
Electric Fence
used as a tool to write software programs that interact well with the operating system
Heap
used as a tool to write software programs that interact well with the operating system
GCC
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Buffer overflow
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Library-based defenses
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Base64
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
AES
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
C
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Stack
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Electric Fence
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Heap
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
GCC
Question
42)Briefly describe DES and its variants.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 8: Secure Programming With C and Openssl
1
3)The strlen function should only be used when '\0' terminated string is guaranteed.
True
2
12)Certificate revocation is done in OpenSSL by using the ca command with the -____ option.

A) remove
B) retire
C) revoke
D) crl
C
3
6)C/C++ developers must do their own memory management using the standard APIs malloc(), alloc(), realloc(), free(), new() and ____ .

A) delete()
B) remove()
C) revoke()
D) erase()
A
4
15)____ encoding is very useful when binary data needs to transfer correctly among platforms with different code pages over the Internet.

A) Base64
B) SHA1
C) MD5
D) RC4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
1)C is "close to the machine," as the abstractions the language introduced are readily grounded in the concrete data types and operations supplied by conventional computers
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
4)As part of a shell program or batch program, OpenSSL commands are usually run in interactive mode.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
9)The OpenSSL command-line tool executable is called ____ on UNIX.

A) openssl.exe
B) openssl
C) cmdssl
D) opensslcmd
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
20)____ is a popular software program that uses encryption techniques to encrypt and digitally sign e-mail.

A) PKCS
B) EVP
C) PGP
D) FIPS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
17)OpenSSL provides the APIs ____ for Base64 decoding.

A) EVP_DecodeBase64
B) EVP_B64Decode
C) EVP_Base64DecodeBlock
D) EVP_DecodeBlock
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
2)Totally strong type checking is possible to achieve.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
19)____ is a symmetric block cipher designed in 1993 by Bruce Schneier as a fast, free alternative to existing encryption algorithms.

A) IDEA
B) AES
C) RC5
D) Blowfish
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
11)The ____ command is a PKCS#10 certificate request and certificate generating utility.

A) cert
B) req
C) pkcs
D) pkcsreq
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
14)OpenSSL provides a single API set that serves as an interface to all hashing and symmetric cryptography algorithms: the ____ interface.

A) SSL
B) EVP
C) Crypt
D) Security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
8)Buffer overflow provides the ability to overwrite a return address causing ____.

A) heap overruns
B) variable overruns
C) stack overruns
D) variable smashing
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
7)A language is ____ typed if it enforces type abstractions where operations can be applied only to objects of the appropriate type.

A) weakly
B) virtually
C) securely
D) strongly
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
5)OpenSSL contains a minimal CA application that ships with the toolkit.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
16)OpenSSL provides the APIs ____ for Base64 encoding.

A) EVP_B64EncodeBlock
B) EVP_Base64EncodeBlock
C) EVP_EncodeBlock
D) EVP_Base64Block
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
13)The ____ option in the ca command is used to generate the CRL.

A) -gencrl
B) -crl
C) -revoke
D) -crlcert
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
10)The OpenSSL command-line tool executable is called ____ on Windows.

A) openssl.bat
B) openssl.com
C) cmdssl.exe
D) openssl.exe
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
18)____ is a symmetric key-encryption technique that will replace the commonly used DES standard.

A) AES
B) RC2
C) IDEA
D) Blowfish
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
25)The standard organization ____ has been developing a standard for transport layer security based on SSL, and the result is TLS version 1.

A) IEFT
B) ACM
C) OSI
D) IEEE
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
33)Why is it hard to write secure code with C?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
22)A ____ cipher is a symmetric cipher in which the input digits are encrypted one at a time.

A) block
B) group
C) bit
D) stream
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
34)What causes a buffer overflow?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
29)____________________ is a specific type of stack overrun attack where the goal is to overwrite the return address of subroutines on the stack.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
28)One common buffer overflow attack is called the ____________________, where the target is to overwrite internal data of a program.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
35)Why are most high-level programming languages essentially immune to buffer overflow problems?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
36)Describe the memory arrangement of a C program.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
24)____ is a protocol that provides a secure channel between two systems.

A) AES
B) FIPS
C) SSL
D) EVP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
31)____________________ is the mathematical process that produces the message digest or "hash."
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
37)What is the general algorithm for a stack overrun attack?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
39)How can you revoke a certificate in OpenSSL?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
38)Describe the structure of a configuration file for OpenSSL.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
40)How does hashing work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
26)____ are usually used in conjunction with nonsecret parameters to derive one or more keys from a common secret value.

A) TLS
B) EVPs
C) KDFs
D) MACs
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
30)The open source toolkit ____________________ is the de facto standard library for full-feature cryptography and SSL implementation for use with the C programming languages.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
21)____ is a block cipher designed by Xuejia Lai and James L. Massey in 1991.

A) AES
B) IDEA
C) Blowfish
D) RC4
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
27)____________________ helps to insure the security and portability of the code, and it usually requires that the programmer explicitly define the types of each object in a program.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
41)What is the core path for hashing with EVP API?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
23)Most block ciphers are constructed by composing several simpler functions. These ciphers are called iterated block ciphers or ____ ciphers.

A) hybrid
B) product
C) stream
D) group
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
detect any attempt to run illegal code on the stack
Buffer overflow
detect any attempt to run illegal code on the stack
Library-based defenses
detect any attempt to run illegal code on the stack
Base64
detect any attempt to run illegal code on the stack
AES
detect any attempt to run illegal code on the stack
C
detect any attempt to run illegal code on the stack
Stack
detect any attempt to run illegal code on the stack
Electric Fence
detect any attempt to run illegal code on the stack
Heap
detect any attempt to run illegal code on the stack
GCC
an extremely common security flaw in C/C++
Buffer overflow
an extremely common security flaw in C/C++
Library-based defenses
an extremely common security flaw in C/C++
Base64
an extremely common security flaw in C/C++
AES
an extremely common security flaw in C/C++
C
an extremely common security flaw in C/C++
Stack
an extremely common security flaw in C/C++
Electric Fence
an extremely common security flaw in C/C++
Heap
an extremely common security flaw in C/C++
GCC
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Buffer overflow
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Library-based defenses
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Base64
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
AES
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
C
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Stack
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Electric Fence
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
Heap
tool that detects memory leak, out-of-bound arrays, and other run-time memory problems
GCC
a set of programming language compilers produced by the GNU Project
Buffer overflow
a set of programming language compilers produced by the GNU Project
Library-based defenses
a set of programming language compilers produced by the GNU Project
Base64
a set of programming language compilers produced by the GNU Project
AES
a set of programming language compilers produced by the GNU Project
C
a set of programming language compilers produced by the GNU Project
Stack
a set of programming language compilers produced by the GNU Project
Electric Fence
a set of programming language compilers produced by the GNU Project
Heap
a set of programming language compilers produced by the GNU Project
GCC
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Buffer overflow
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Library-based defenses
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Base64
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
AES
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
C
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Stack
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Electric Fence
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
Heap
the new standard cryptographic algorithm for U.S. government organizations to protect sensitive information
GCC
holds all dynamic variables allocated by malloc() and the new operator
Buffer overflow
holds all dynamic variables allocated by malloc() and the new operator
Library-based defenses
holds all dynamic variables allocated by malloc() and the new operator
Base64
holds all dynamic variables allocated by malloc() and the new operator
AES
holds all dynamic variables allocated by malloc() and the new operator
C
holds all dynamic variables allocated by malloc() and the new operator
Stack
holds all dynamic variables allocated by malloc() and the new operator
Electric Fence
holds all dynamic variables allocated by malloc() and the new operator
Heap
holds all dynamic variables allocated by malloc() and the new operator
GCC
used to store program state such as procedure arguments, local variables, and register values
Buffer overflow
used to store program state such as procedure arguments, local variables, and register values
Library-based defenses
used to store program state such as procedure arguments, local variables, and register values
Base64
used to store program state such as procedure arguments, local variables, and register values
AES
used to store program state such as procedure arguments, local variables, and register values
C
used to store program state such as procedure arguments, local variables, and register values
Stack
used to store program state such as procedure arguments, local variables, and register values
Electric Fence
used to store program state such as procedure arguments, local variables, and register values
Heap
used to store program state such as procedure arguments, local variables, and register values
GCC
used as a tool to write software programs that interact well with the operating system
Buffer overflow
used as a tool to write software programs that interact well with the operating system
Library-based defenses
used as a tool to write software programs that interact well with the operating system
Base64
used as a tool to write software programs that interact well with the operating system
AES
used as a tool to write software programs that interact well with the operating system
C
used as a tool to write software programs that interact well with the operating system
Stack
used as a tool to write software programs that interact well with the operating system
Electric Fence
used as a tool to write software programs that interact well with the operating system
Heap
used as a tool to write software programs that interact well with the operating system
GCC
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Buffer overflow
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Library-based defenses
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Base64
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
AES
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
C
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Stack
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Electric Fence
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
Heap
a data-encoding scheme that converts binary-encoded data to printable ASCII characters
GCC
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)Briefly describe DES and its variants.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.