Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 239

A security engineer is implementing a server-side TLS configuration that provides forward secrecy and authenticated encryption with associated data. Which of the following algorithms, when combined into a cipher suite, will meet these requirements? (Choose three.)

    Correct Answer: C, D, H

    To achieve forward secrecy and authenticated encryption with associated data in a server-side TLS configuration, the following algorithms should be combined into a cipher suite: GCM (Galois/Counter Mode) provides authenticated encryption with associated data, AES (Advanced Encryption Standard) is a strong and widely used symmetric encryption standard often used in conjunction with GCM for AEAD, and DH (Diffie-Hellman) enables secure key exchange to ensure forward secrecy. These selections collectively meet the requirements for both forward secrecy and AEAD.

Discussion
CockOptions: CDG

Forward secrecy is a feature that ensures that encrypted communications are secure even if the private keys are compromised in the future. Authenticated encryption with associated data (AEAD) is a mode of encryption that provides confidentiality, integrity, and authenticity. GCM (Galois/Counter Mode) is a block cipher mode that provides AEAD encryption, authenticity, and integrity. AES (Advanced Encryption Standard) is a symmetric block cipher algorithm used in GCM mode for providing encryption. ECDSA (Elliptic Curve Digital Signature Algorithm) is a public-key cryptographic algorithm used to provide authentication.

WHODISNEWFONEOptions: CDG

Answer is C,D,G

23169fdOptions: CDH

While ECDSA (Elliptic Curve Digital Signature Algorithm) is important for digital signatures and ensuring data integrity and authenticity, it does not contribute to forward secrecy. Therefore, for the specific requirement of forward secrecy and AEAD, DH (or its elliptic curve variant ECDHE) is the appropriate choice.

23169fdOptions: CDG

ECDSA (Elliptic Curve Digital Signature Algorithm): Provides efficient and secure digital signatures, which are crucial for server authentication. GCM (Galois/Counter Mode): Provides authenticated encryption with associated data (AEAD). AES (Advanced Encryption Standard): A widely used and strong encryption standard.

EAlonsoOptions: CDH

Sorry, ECDSA does not has DH.

EAlonso

CDG, Diffie-Hellman is in ECDSA.

ninjachuletaOptions: CDG

To achieve forward secrecy and authenticated encryption with associated data (AEAD), the security engineer should choose the following algorithms: C. GCM (Galois/Counter Mode): GCM provides authenticated encryption with associated data (AEAD) and is widely used for its efficiency and security. D. AES (Advanced Encryption Standard): AES is a symmetric encryption algorithm commonly used in conjunction with GCM for AEAD. G. ECDSA (Elliptic Curve Digital Signature Algorithm): ECDSA is commonly used for digital signatures in TLS, providing authentication and integrity.

ninjachuleta

Explanation: A. EDE: EDE (Encrypt-Decrypt-Encrypt) is a mode of operation for block ciphers, not an encryption algorithm itself. B. CBC (Cipher Block Chaining): CBC is a mode of operation for block ciphers that does not provide authenticated encryption with associated data (AEAD). E. RSA: RSA is an asymmetric encryption algorithm commonly used for key exchange and digital signatures in TLS but does not directly provide authenticated encryption with associated data (AEAD). F. RC4: RC4 is a stream cipher and is not recommended for use in TLS due to security vulnerabilities. H. DH (Diffie-Hellman): Diffie-Hellman is a key exchange algorithm that can provide forward secrecy when used in conjunction with symmetric encryption, but it does not directly provide authenticated encryption with associated data (AEAD).

ThatGuyOverThereOptions: CDH

Pretty confident on this one. You would not use ECDSA (Elliptic Curve Digital Signature Algorithm) in this situation. That is for digital signatures and not for sending data. DH when using its ephemeral form (EDH or DHE) would provide forward secrecy. RSA would not be used in conjunction with AES, it would be either or.

ThatGuyOverThere

Yea don't listen to this. Did not do enough research.

ThatGuyOverThere

Even though my comments about ECDSA are wrong. I still think CDH is the best answer, though I think the answers for the question are too confusing. They should have combined AES and GCM to one answer and they should have changed DH to ECDHE

ddcnsd65

DH was developed specifically for "key exchange" and not for data encryption or digital signatures. It was designed to allow two users to exchange a secret key over an insecure channel without any prior communication.

Ariel235788Options: CDE

To achieve forward secrecy and authenticated encryption with associated data (AEAD), you should use modern and secure cipher suites. Here are three algorithms that, when combined into a cipher suite, meet these requirements: C. GCM (Galois/Counter Mode): GCM provides both authenticated encryption and the ability to achieve forward secrecy when used with appropriate key exchange mechanisms like ECDHE or DHE. D. AES (Advanced Encryption Standard): AES is a symmetric encryption algorithm commonly used with AEAD cipher suites. E. RSA (Rivest–Shamir–Adleman): While RSA is not typically used for forward secrecy, it can be used for authentication in conjunction with other algorithms that provide forward secrecy.

Ariel235788

why the others are incorrect: A. EDE (Encrypt-Decrypt-Encrypt): EDE is a mode of operation for block ciphers, and it's not commonly used in TLS cipher suites. B. CBC (Cipher Block Chaining): CBC is an older mode of operation with known security vulnerabilities, and it is not recommended for modern TLS cipher suites. F. RC4 (Rivest Cipher 4): RC4 is a stream cipher with significant security weaknesses and should not be used in modern TLS configurations.

Ariel235788

Changing my answer; To achieve forward secrecy and authenticated encryption with associated data (AEAD) in a TLS configuration, you should use modern and secure cipher suites. Here are three algorithms that, when combined into a cipher suite, meet these requirements: GCM (Galois/Counter Mode): GCM provides both authenticated encryption and the ability to achieve forward secrecy when used with appropriate key exchange mechanisms like ECDHE or DHE. AES (Advanced Encryption Standard): AES is a symmetric encryption algorithm commonly used with AEAD cipher suites. ECDHE (Elliptic Curve Diffie-Hellman Ephemeral): ECDHE is a key exchange algorithm that provides forward secrecy when combined with GCM or AES for encryption. CDG is correct, i didnt upload all the answer choices in my ChatGPT query

AlizadehOptions: CDH

The correct answers are C, D, and H.

javier051977Options: CDH

The three algorithms that, when combined into a cipher suite, provide forward secrecy and authenticated encryption with associated data are: C. GCM (Galois/Counter Mode) D. AES (Advanced Encryption Standard) H. DH (Diffie-Hellman) ECDSA is an algorithm used for digital signatures and is not directly related to encryption, so it cannot be used for authenticated encryption with associated data. It is typically used in TLS for certificate signing and verification. Therefore, ECDSA cannot be used to meet the requirements of forward secrecy and authenticated encryption with associated data in the given scenario.

BreakOff874

This is from the book, page 216: DH by itself does not provide any authentication mechanism and so cannot adequately identify if the other party is really who they claim to be without utilizing an authentication mechanism in parallel.