The other three choices are incorrect because they are not used in the implementation of encrypting routers or secure radios. Single-chip cryptographic modules are physical embodiments in which a single IC chip may be used as a standalone module or may be embedded within an enclosure or a product that may not be physically protected. Cryptographic modules can be implemented in software, hardware, firmware, and hybrid.
2. Regarding cryptographic modules, which of the following refers to an attack on the operations of the hardware module that does
a. Timing analysis attack
b. Noninvasive attack
c. Differential power analysis attack
d. Simple power analysis attack
The other three choices are incorrect because their actions are different than a non-invasive attack. A timing analysis attack is an attack on a cryptographic module that is based on an analysis of time periods between the time a command is issued and the time the result is obtained. A differential power analysis attack considers the variations of the electrical power consumption of a cryptographic module to correlate to cryptographic keys used in a cryptographic algorithm. A simple power analysis attack considers the patterns of instruction execution to reveal the values of cryptographic keys.
3. Regarding physical security of cryptography, which of the following modules are used the
a. Single-chip cryptographic modules
b. Multiple-chip standalone cryptographic modules
c. Multiple-chip embedded cryptographic modules
d. Hardware cryptographic modules
The other three choices are incorrect because they are not used in the implementation of adapters and expansion boards. Single-chip cryptographic modules are physical embodiments in which a single IC chip may be used as a standalone module or may be embedded within an enclosure or a product that may not be physically protected. Multiple-chip standalone cryptographic modules are physical embodiments in which two or more IC chips are interconnected and the entire enclosure is physically protected. Cryptographic modules can be implemented in software, hardware, firmware, and hybrid.
4. Regarding cryptography, which of the following externally indicates that the physical security of a cryptographic module was compromised?
a. Tamper attempt
b. Tamper evidence
c. Tamper detection
d. Tamper response
The other three choices are incorrect because do not indicate a compromise and their actions are internal. Tamper attempt means that an attacker has made a serious try to defeat the physical security of a cryptographic module. Tamper detection is the automatic determination by a cryptographic module that an attempt has been made to compromise the physical security of the module. Tamper response is the automatic action taken by a cryptographic module when a tamper attempt has been detected.
5. Which of the following are
a. Tamper detection and tamper response
b. Tamper attempt and tamper prevention
c. Tamper prevention and tamper detection