SamSam ransomware relies on which encryption key algorithm?

Prepare for the Certified Ethical Hacker Version 11 Exam with a comprehensive test featuring flashcards and multiple choice questions, each accompanied by hints and explanations to ensure a thorough understanding. Ace your ethical hacking exam with confidence!

Multiple Choice

SamSam ransomware relies on which encryption key algorithm?

Explanation:
SamSam uses a hybrid encryption approach: the actual file data is encrypted with a fast symmetric key, but that key itself is encrypted with a public-key algorithm so only the attacker can decrypt it. The public-key algorithm used here is RSA with a 2048-bit key (RSA-2048). This means the attacker can decrypt the session key with the corresponding private key, then decrypt the files. The other options are symmetric ciphers that could be used for the data encryption step, not the key-encryption step. DES and Blowfish are older or less common choices, and while AES is widely used for data encryption, the key meant to protect the encryption key in this context is RSA-2048.

SamSam uses a hybrid encryption approach: the actual file data is encrypted with a fast symmetric key, but that key itself is encrypted with a public-key algorithm so only the attacker can decrypt it. The public-key algorithm used here is RSA with a 2048-bit key (RSA-2048). This means the attacker can decrypt the session key with the corresponding private key, then decrypt the files. The other options are symmetric ciphers that could be used for the data encryption step, not the key-encryption step. DES and Blowfish are older or less common choices, and while AES is widely used for data encryption, the key meant to protect the encryption key in this context is RSA-2048.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy