1.
Naredba: keytool - export -alias DSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -rfc -file /c:\Users\sadamovic\Desktop\DSAsertifikat.b64
Correct Answer
F. Izvoz DSA sertifikata u BASE64 formatu
Explanation
The given command "keytool - export -alias DSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -rfc -file /c:\Users\sadamovic\Desktop\DSAsertifikat.b64" exports the DSA certificate in BASE64 format. This means that the DSA certificate will be encoded using the BASE64 encoding scheme, which represents binary data in ASCII format. The exported certificate will be saved in the file named "DSAsertifikat.b64" on the desktop of the user "sadamovic".
2.
Izaberite tacnu tvrdnju:
Correct Answer
B. Problem autentifikacije je moguce resiti sa digitalnim potpisom
Explanation
The correct answer is "Problem autentifikacije je moguce resiti sa digitalnim potpisom." The explanation is that a digital signature is a cryptographic mechanism that provides authentication and integrity of digital documents. It ensures the identity of the sender and verifies that the document has not been tampered with during transmission. Therefore, it is possible to solve the problem of authentication using a digital signature.
3.
Sta podrazumeva dokaziva racunarska bezbednost?
Correct Answer
B. Da se za zadati kriptografski sistem moze rigorozno dokazati nominovana bezbednost u odnosu na protivnika koji poseduje specificne vremenske i racunarske resurse
Explanation
The correct answer states that computational security is achieved when the nominated security of a given cryptographic system can be rigorously proven against an adversary who has specific time and computational resources. This means that the cryptographic system can withstand attacks from an adversary with limited resources and still maintain its security. The answer excludes the possibility of proving security against an adversary with unlimited time and resources, as well as against specific keys and algorithms.
4.
Naredba: keytool -genkey -keyalg RSA -keysize 2048 -alias parKljuceva -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore\DSAsertifikat.b64
Correct Answer
E. Generisanje para kljuceva (privatni i javni)
Explanation
The given command "keytool -genkey -keyalg RSA -keysize 2048 -alias parKljuceva -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore\DSAsertifikat.b64" is used to generate a key pair (private and public) for encryption and decryption purposes. This command specifies the algorithm (RSA), key size (2048 bits), alias (parKljuceva), and the location to store the generated key pair (/c:\Users\sadamovic\Desktop\skladiste.keystore\DSAsertifikat.b64).
5.
Pozivom metoda getPublic().getEncoded() nad instancom KeyPair, metod ce vratiti:
Correct Answer
E. Javni kljuc u formatu niz bajtova
Explanation
The method getPublic().getEncoded() returns the public key in the form of a byte array.
6.
Naredba: keytool -export -alias RSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -file /c:\Users\sadamovic\Desktop\RSAsertifikat.der
Correct Answer
D. Izvoz RSA sertifikata u DER formatu
Explanation
The given command "keytool -export -alias RSAsertifikat -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore -file /c:\Users\sadamovic\Desktop\RSAsertifikat.der" is used to export an RSA certificate in DER format. The command specifies the alias of the certificate as "RSAsertifikat" and the keystore file location as "/c:\Users\sadamovic\Desktop\skladiste.keystore". It exports the certificate to a file named "RSAsertifikat.der" at the specified location "/c:\Users\sadamovic\Desktop\".
7.
Autentifikacija i tajnost su:
Correct Answer
D. Teorijski nekompatabilni
Explanation
Authentication and confidentiality are theoretically incompatible. This means that in theory, it is difficult to achieve both authentication and confidentiality simultaneously. Authentication ensures that the user or entity is who they claim to be, while confidentiality ensures that the information is kept private and secure. In practice, implementing strong authentication measures can sometimes compromise confidentiality, and vice versa. However, this answer suggests that in theory, it is not possible to achieve both authentication and confidentiality without some trade-offs or challenges.
8.
Sta podrazumeva racunarska ili prakticna bezbednost?
Correct Answer
C. Bezbednost u odnosu na protivnika koji ima specificne ogranicene vremenske i racunarske resurse
Explanation
The correct answer suggests that the concept of security in this context refers to protecting against an adversary who has limited time and computational resources. This implies that the focus is on preventing attacks from adversaries who are constrained in terms of time and computing power, indicating a need for efficient and effective security measures within those limitations.
9.
Sta podrazumeva Senonov pseudo ideal tajnog komuniciranja?
Correct Answer
C. Posiljalac - PRNG - primalac
Explanation
The Senone's pseudo-ideal secret communication implies that the sender uses a Pseudo Random Number Generator (PRNG) to encrypt the message, and the receiver uses the same PRNG to decrypt the message. Therefore, the correct sequence for Senone's pseudo-ideal secret communication is posiljalac (sender) - PRNG - primalac (receiver).
10.
Bez poznavanja kljuca perfektne sifre:
Correct Answer
C. Svaki otvoreni tekst podjednako verovatno moze odgovarati bilo kom kljucu
Explanation
The given statement implies that without knowledge of the perfect cipher key, any open text can equally likely correspond to any key. This means that there is no specific relationship between the open text and the key, and any key could potentially decrypt the open text. Therefore, the answer states that any open text is equally likely to correspond to any key.
11.
Da bismo garantovali autentifikaciju, verovatnoca PI mora biti mala, a to znaci da uzajamna informacija izmedju sifrata i kljuca mora biti velika. S druge strane znamo da bismo obezbedili apsolutnu tajnost mora vaziti I(C;M)=0, sto je oprecno zahtevu autentifikacije:
Correct Answer
B. Tvrdnja je tacna
Explanation
The given statement is discussing the requirements for authentication and confidentiality in a cryptographic system. It states that in order to guarantee authentication, the probability of incorrect decryption (PI) must be low, which means that the mutual information between the ciphertext (C) and the key (K) must be high. On the other hand, to ensure absolute confidentiality, it must hold that I(C;M) = 0, which contradicts the requirement for authentication. Therefore, the statement is true because the requirements for authentication and absolute confidentiality are contradictory.
12.
Primer iz prakse za otvaranje sefa sa dva kljuca, lansiranje rakete zahteva tri autorizacije i sl, je primer za scenario:
Correct Answer
C. Deljenje tajni
Explanation
The given scenario of opening a safe with two keys and launching a rocket requiring three authorizations indicates the concept of "Deljenje tajni" or "Sharing secrets." In this scenario, multiple individuals hold different pieces of information or keys, and their collaboration is necessary to achieve the desired outcome. This concept emphasizes the need for sharing classified information or access to restricted resources among trusted parties to accomplish a specific task or goal.
13.
Ako su autentifikacija i tajnost dva nezavisna servisa, u tom slucaju kriptografski sistemi za apsolutnu tajnost:
Correct Answer
B. Ne mogu obezbediti autenticnost
Explanation
Cryptographic systems for absolute secrecy cannot provide authentication because authentication involves verifying the identity of the sender or recipient of a message. While cryptographic systems can ensure confidentiality by encrypting the message, they do not have the capability to verify the authenticity of the sender or recipient. Authentication requires additional mechanisms such as digital signatures or certificates to ensure the integrity and authenticity of the communication.
14.
Nakon razmene serijskog kljuca preko PFS, Alisa i Bob:
Correct Answer
A. Ne mogu da rekonstruisu tajne parametre Difi-Helmana
15.
Naredba: keytool -list -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore
Correct Answer
C. Pregled generisanih sertifikata u skladistu
Explanation
The given command "keytool -list -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore" is used to list the certificates generated in the keystore located at the specified path. It allows the user to view the certificates stored in the keystore, providing an overview of the generated certificates in the keystore.
16.
Pozivom verify() nad instancom klase Signature:
Correct Answer
A. Verifikovan je digitalni potpis
Explanation
The correct answer is "Verifikovan je digitalni potpis" because the sentence translates to "The digital signature has been verified." This suggests that the verify() method called on the Signature class instance successfully confirmed the authenticity and integrity of the digital signature.
17.
Metoda getFormat() nad klasom X509EncodedKeySpec daje:
Correct Answer
B. Format javnog kljuca
Explanation
The getFormat() method on the X509EncodedKeySpec class returns the format of the public key. This means that when this method is called, it will provide information about the format in which the public key is encoded. It does not provide information about the format of the private key or the encryption algorithm used.
18.
One-time pad sifra:
Correct Answer(s)
B. Predstavlja bezuslovno bezbedan kripto sistem
E. Veoma je neprakticna za upotrebu u racunarskim mrezama
F. Koristi se na mestima gde se zahteva visok nivo zastite
Explanation
The correct answer is "Predstavlja bezuslovno bezbedan kripto sistem, Veoma je neprakticna za upotrebu u racunarskim mrezama, Koristi se na mestima gde se zahteva visok nivo zastite." This answer is correct because it states that the one-time pad cipher is unconditionally secure, meaning it cannot be cracked even with unlimited computational power. It also mentions that it is impractical for use in computer networks and is used in places where a high level of security is required.
19.
Za implementaciju PFS u zastitni protokol, koristi se:
Correct Answer
B. Difi-Helman
Explanation
Difi-Helman se koristi za implementaciju PFS (Perfect Forward Secrecy) u zastitni protokol. PFS je sigurnosna karakteristika koja osigurava da, čak i ako se privatni ključ kompromituje u budućnosti, prethodne komunikacije ostanu sigurne. Difi-Helman protokol omogućava razmenu tajnih ključeva između dvije strane koje komuniciraju, bez da te ključeve razmjenjuju preko mreže. Na taj način, čak i ako napadač presretne komunikaciju i dobije trenutne ključeve, neće biti u mogućnosti dešifrovati prethodne poruke.
20.
Sta podrazumeva dokaziva bezuslovna bezbednost?
Correct Answer
A. Da se za zadati kriptografski sistem moze rigorozno dokazati nominovana bezbednost u odnosu na protivnika koji raspolaze neogranicenim vremenskim resursima
Explanation
The correct answer states that unconditional security implies that for a given cryptographic system, it can be rigorously proven to have nominated security against an adversary with unlimited time resources. This means that no matter how much time the adversary has, they will not be able to break the security of the system.
21.
Klasu PKCS8EncodedKeySpec koristimo za:
Correct Answer
A. Ucitavanje privatnog kljuca
Explanation
The correct answer is "Ucitavanje privatnog kljuca" which translates to "Loading private key" in English. PKCS8EncodedKeySpec is a class in Java that is used for encoding and decoding private keys in PKCS#8 format. Therefore, it is used for loading or reading private keys.
22.
Autentifikacija podrazumeva:
Correct Answer
D. Proveru da li je primljeni kriptogram poslat od autorizovane osobe
Explanation
Authentication refers to the process of verifying the identity of the sender or the source of a message. In this context, the correct answer states that authentication involves checking whether the received cryptogram (encrypted message) is sent from an authorized person. This means that the authentication process is focused on ensuring that the sender of the message is indeed authorized to send it, thus confirming the authenticity and integrity of the message.
23.
Ako je sifrat One-time pad-a C=1000, a kljuc K=1111. sta je P?
Correct Answer
B. P=0111
Explanation
The question states that the ciphertext (C) is 1000 and the key (K) is 1111. The correct answer, P=0111, can be obtained by performing a bitwise XOR operation between C and K. XORing 1 with 1 gives 0, XORing 0 with 1 gives 1, and XORing 0 with 0 gives 0. Therefore, XORing 1 with 0 gives 1. By applying this operation to each corresponding bit of C and K, we get the result P=0111.
24.
Kriptosistem je perfektno tajan ako sifrat ne otkriva informaciju o:
Correct Answer(s)
C. Kljucu
E. Otvorenom tekstu
Explanation
A perfect secret cryptographic system is one that does not reveal any information about the key or the plaintext. In this case, the correct answer is "kljucu" (key) and "otvorenom tekstu" (plaintext). The key is the secret parameter used in the encryption and decryption process, and the plaintext is the original message that is being encrypted. In a perfect secret cryptographic system, the ciphertext should not provide any information about the key or the plaintext, ensuring the confidentiality and security of the communication.
25.
Naredba: keytool -genkey -alias DSAsertifikat -v -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore
Correct Answer
I. Generisanje DSA sertifikata za digitalni potpis
Explanation
The given command "keytool -genkey -alias DSAsertifikat -v -keystore /c:\Users\sadamovic\Desktop\skladiste.keystore" is used to generate a DSA certificate for digital signing. The "-genkey" option is used to generate a new key pair, "-alias DSAsertifikat" sets the alias for the generated key pair, "-v" enables verbose output, and "-keystore /c:\Users\sadamovic\Desktop\skladiste.keystore" specifies the location and name of the keystore file where the generated key pair will be stored. This command is specifically used for generating a DSA certificate for digital signing purposes.
26.
Kod scenarija za deljenje tajni:
Correct Answer
A. Nije moguce rekonstruisati kljuc bez jednog dela kljuca
Explanation
The scenario for secret sharing states that it is not possible to reconstruct the key without one part of the key. This means that each part of the key is essential for reconstructing the original key. Therefore, if one part of the key is missing, it is not possible to reconstruct the complete key.
27.
Izaberite kriptografske protokole:
Correct Answer(s)
C. Kerberos
D. GSM
G. SSL
Explanation
The correct answer includes the protocols Kerberos, GSM, and SSL. Kerberos is a network authentication protocol that provides secure communication over an insecure network. GSM (Global System for Mobile Communications) is a standard protocol for mobile telecommunications that includes encryption for secure communication. SSL (Secure Sockets Layer) is a cryptographic protocol that provides secure communication over the internet. These protocols are commonly used to ensure the confidentiality and integrity of data transmission.
28.
Izabrati pravilno koriscenu notaciju za opisani slucaj?
Correct Answer(s)
D. Desifrovati poruku sa Bobovim javnim kljucem : {C}Bob d
E. Potpisati poruku M sa Alisinim privatnim kljucem: [M]Alisa d
Explanation
The correct answer is "Desifrovati poruku sa Bobovim javnim kljucem : {C}Bob d, Potpisati poruku M sa Alisinim privatnim kljucem: [M]Alisa d". This is because "Desifrovati poruku sa Bobovim javnim kljucem" means decrypting a message with Bob's public key, and "Potpisati poruku M sa Alisinim privatnim kljucem" means signing a message M with Alice's private key. Both of these actions are described using the correct notation in the given options.
29.
Koje operacione scenarije ukljucuje nominovana bezbednost?
Correct Answer(s)
B. Informacije poznate korisnicima sistema
C. Sve fizicke pretpostavke, u odnosu na ono sto korisnici sistema mogu da urade
E. Otpornost sistema na odredjene napade
F. Informacije poznate napadacu
Explanation
The nominated security includes scenarios that involve information known to system users, all physical assumptions regarding what system users can do, the system's resistance to certain attacks, and information known to attackers.
30.
Sifarski sistem je bezuslovno bezbedan ako:
Correct Answer
C. Ne moze da bude razbijen ni uz pomoc neogranicenih racunarskih resursa
Explanation
The correct answer is that the system cannot be broken even with unlimited computer resources. This means that no matter how much computational power is available, the encryption algorithm used in the system is so strong that it cannot be cracked or decrypted. This level of security ensures that the system is completely safe and cannot be compromised, making it unconditionally secure.
31.
Izaberite tacnu definiciju perfektne sifre?
Correct Answer
A. Postoji kljuc koji preslikava svaku poruku u bilo koji sifrat sa jednakom verovatnocom
Explanation
The correct answer is "Postoji kljuc koji preslikava svaku poruku u bilo koji sifrat sa jednakom verovatnocom." This means that there is a key that can map any message to any cipher with equal probability. In other words, each message has an equal chance of being encrypted into any possible cipher. This ensures that the encryption process is unbiased and random, making it difficult for an attacker to determine the original message based on the cipher.
32.
Na slici je prikazana sema:
Correct Answer
E. Opstog simetricnog sistema tajnog komuniciranja
Explanation
The correct answer is "opstog simetricnog sistema tajnog komuniciranja" which translates to "general symmetric system of secret communication" in English. This answer suggests that the diagram represents a general system of secret communication that uses symmetric encryption techniques.
33.
Sta predstavlja protokol na slici?
Correct Answer(s)
B. Razmenu sesijskog kljuca preko javnog kljuca
C. Razmenu sesijskog kljuca bez uzajmne autentifikacije
Explanation
The correct answer is "Razmenu sesijskog kljuca preko javnog kljuca". This is because the protocol on the image represents the exchange of a session key using a public key.
34.
U dizajnu protokola sa slike:
Correct Answer
C. Kljuc K je digitalno potpisan
Explanation
In the protocol design shown in the image, the key K is digitally signed. This means that a digital signature is applied to the key K, providing authentication and integrity verification. By digitally signing the key, the recipient can verify that the key has not been tampered with during transmission and that it was indeed sent by the intended sender. This ensures the security and trustworthiness of the key used in the protocol.
35.
Karakteristike koje sifre su prikazane na slici?
Correct Answer
C. Perfektni sifarski algoritam
Explanation
The question is asking about the characteristics of the codes shown in the picture. The correct answer is "Perfektni sifarski algoritam" which translates to "Perfect cipher algorithm" in English. This suggests that the codes in the picture are an example of a perfect cipher algorithm, which is a type of encryption algorithm that provides perfect secrecy and is unbreakable even with infinite computational power.
36.
Dizajn kog protokola je prikazan na slici?
Correct Answer
B. Za uzajamnu autentifikaciju sa simetricnim kljucem
Explanation
The correct answer is "za uzajamnu autentifikaciju sa simetricnim kljucem" which translates to "for mutual authentication with symmetric key" in English. This suggests that the protocol design shown in the picture is for a communication process where both parties authenticate each other using a shared symmetric key.
37.
Na sledecem java fragmentu koda prikazan je proces:
Correct Answer
F. Ucitavanja kljuca
Explanation
The given answer "ucitavanja kljuca" (loading the key) is correct because it is the last step mentioned in the given Java code fragment. The code fragment describes a process that includes generating a key pair, generating a Java keystore, generating an instance for the RSA algorithm, storing the generated cryptographic key, changing the password of the Java keystore, and finally loading the key.
38.
Na sledecem fragmentu java koda instance klase KeyPair sadrzi:
Correct Answer
D. Privatni i javni kljuc
Explanation
The correct answer is "privatni i javni kljuc." This is because the class KeyPair in Java typically represents a pair of cryptographic keys, which consists of both a private key and a public key. These keys are used for various encryption and decryption operations in cryptography.
39.
Koji scenario je prikazan na slici?
Correct Answer
B. Bob autentifikuje Alisu sa simetricnim kljucem
Explanation
The correct answer is "Bob autentifikuje Alisu sa simetricnim kljucem". This means that Bob is authenticating Alice using a symmetric key. This implies that Bob and Alice share the same key, and Bob is verifying Alice's identity using this key.
40.
Na sledecem fragmentu java koda prikazan je:
Correct Answer
A. Proces generisanja para kljuceva preko KePairGenerator java klase za RSA algoritam
41.
Na sledecem fragmentu java koda prikazan je proces:
Correct Answer
B. Desiforvanja sa RSA algoritmom
Explanation
The given correct answer is "Desiforvanja sa RSA algoritmom" which translates to "Decryption with the RSA algorithm" in English. This process involves using the RSA algorithm to decrypt encrypted data. RSA is a widely used encryption algorithm in which a public key is used for encryption and a private key is used for decryption. In this process, the encrypted data is decrypted using the private key, which ensures the confidentiality and integrity of the message.
42.
Koji kriptografski protokol je prikazan na slici?
Correct Answer
D. Protokol za obostranu autentifikaciju koji implementira PFS
Explanation
The correct answer is "Protokol za obostranu autentifikaciju koji implementira PFS." This means that the cryptographic protocol shown in the picture is a protocol for mutual authentication that implements Perfect Forward Secrecy (PFS). PFS ensures that even if the long-term secret key is compromised, past sessions remain secure.
43.
Prikazani protkol na slici obezbedjuje:
Correct Answer(s)
C. Autentifikaciju Boba
D. Uzajamnu autentifikaciju
E. Autentifikaciju Alise
Explanation
The protocol shown in the image provides authentication for Bob, mutual authentication, and authentication for Alice. This means that it ensures the verification of Bob's identity, allows both parties to authenticate each other, and also verifies Alice's identity.
44.
Koji napadi su moguci na protkol sa slike:
Correct Answer
C. Mogucnost ponovnog slanja
Explanation
The correct answer is "mogucnost ponovnog slanja" (possibility of replay attacks). A replay attack occurs when an attacker intercepts and maliciously retransmits data that was previously valid. In the context of the given question, it refers to the possibility of an attacker intercepting and resending data, potentially compromising the security of the system. This could lead to unauthorized access or other malicious actions.
45.
Na sledecem fragmentu java koda prikazan je proces:
Correct Answer
C. Inicijalizacija inicijalnog vektora
Explanation
The given answer suggests that the process being described in the Java code fragment is the initialization of an initialization vector. An initialization vector is commonly used in encryption algorithms, such as AES, to add randomness and enhance the security of the encryption process. It is used to initialize the state of the encryption algorithm before encrypting or decrypting data.
46.
Izabrati tacnu tvrdnju?
Correct Answer
A. Problem autentifikacije je moguce resiti sa digitalnim potpisom
Explanation
The correct answer is "Problem autentifikacije je moguce resiti sa digitalnim potpisom" (The problem of authentication can be solved with a digital signature). A digital signature is a cryptographic technique that provides authentication and integrity to digital documents or messages. It ensures that the sender of the message is verified and that the message has not been tampered with during transmission. Therefore, using a digital signature can effectively solve the problem of authentication.
47.
U protokolu za autentifikaciju sa vremenskim pecatom prvo:
Correct Answer
B. Potpisujemo, zatim racunamo T vremenski pecat i sifrujemo
Explanation
In the given protocol for authentication with a timestamp, the correct sequence of steps is to first sign the message, then calculate the timestamp, and finally encrypt the message. This order ensures that the message is securely signed before the timestamp is added and the entire message is encrypted. If the steps were performed in a different order, the security and integrity of the authentication process could be compromised.
48.
Izaberi algoritam koji se moze koristiti za autentifikaciju asimetricnim kriptografskim funkcijama?
Correct Answer
C. RSA
Explanation
RSA je algoritam koji se može koristiti za autentifikaciju asimetričnim kriptografskim funkcijama. RSA je jedan od najčešće korišćenih algoritama za enkripciju i digitalno potpisivanje. Koristi se za generisanje javnog i privatnog ključa, gde se poruka enkriptuje sa javnim ključem i dekriptuje sa privatnim ključem. Ovaj proces omogućava autentifikaciju i osigurava da samo osoba koja poseduje privatni ključ može dekriptovati poruku.
49.
U protokolu na slici:
Correct Answer(s)
B. Alisa mora da zna lozinku
D. Bob mora da zna lozinku
Explanation
In the given protocol, both Alisa and Bob are required to know the password. This is indicated by the statements "Alisa mora da zna lozinku" (Alisa must know the password) and "Bob mora da zna lozinku" (Bob must know the password). Therefore, the correct answer is that both Alisa and Bob must know the password.
50.
Osnovni uslovi koji reba da budu ispunjeni za pravilnu implementacju One-time pad sifre su:
Correct Answer(s)
D. Kljuc se ne sme ponavljati
E. Kljuc mora biti iste duzine kao i poruka
G. Entropija kljuca H=1
Explanation
The correct answer is that the key must not be repeated, the key must be the same length as the message, and the entropy of the key must be 1. This means that in order for the one-time pad cipher to be implemented correctly, the key used for encryption must not have any repeated characters, it must be the exact same length as the message, and the randomness or unpredictability of the key must be maximum (entropy of 1). These conditions ensure the security and effectiveness of the one-time pad cipher.