01 - Flash Cards

(64 cards)

1
Q

Cryptography

A
  • Cryptography is a security technology used to provide security, integrity and authentication to information that is either stored, in transit or in use.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Caesar Cipher

A
  • It is the earliest known cryptographic method used by Julius Caesar. In this cryptographic system, the coded message is formed by shifting every letter of the alphabet by three to the right.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Goals of Cryptography

A
  • Confidentiality
  • Integrity
  • Authentication
  • Nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A
  • Provides data privacy and security when data is being stored, in transit or used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of Cryptosystems

A
  • Symmetric cryptosystem
  • Asymmetric cryptosystem
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Symmetric cryptosystem

A
  • All cryptosystem users have shared secret key available to them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric cryptosystem

A
  • Every user has an individual key which is a combination of public and private key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Three Types of Data in Cryptographic System

A
  • Data at rest
  • Data in motion
  • Data in use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data at rest

A
  • Data stored at a permanent location. For example hard drives, could etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data in motion

A
  • Data being transmitted between two systems, across a network.
  • Also known as data on wire.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data in use

A
  • Data located in the active memory of a computer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Integrity

A
  • Provides assurance that data is not altered without authorization.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Authentication

A
  • An important feature of cryptosystems as it ensures the identity of a system user.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Nonrepudiation

A
  • Provides assurance to the recipient that the message was provided by the original sender and not someone masquerading as the sender.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Plaintext Message

A
  • Message before it is put into an encrypted form.
  • It is labelled by letter P.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Ciphertext Message

A
  • Plaintext message encrypted by using a cryptographic algorithm. It is labelled by letter C.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Key space

A
  • Set of values that are allowed/valid to be used as a key for a particular algorithm. It is defined by a bit size.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The Kerckhoff Principle

A
  • Cryptographic system assumed to be secure even when everything about it, except the key, is known to the public.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cryptovariable

A
  • Another name for cryptographic key.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Cryptography

A
  • Creation and implementation of codes and ciphers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Cryptanalysis

A
  • Methods used for decoding/deciphering.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cryptology

A
  • Combination of cryptography and cryptanalysis.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cryptosystem

A
  • Installation of code/cipher into a software/hardware system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Boolean Mathematics

A
  • Set of rules used to work with digital circuits (bytes and bits). It is a binary system based on two values - 1 and 0, true and false, respectively.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
AND Operation
* Operation that examines whether out of two values both values are true.
26
OR Operation
* Operation that examines whether at least one of the values is true.
27
NOT Operation
* Operation that reverse the value of the variable. * For example, 1 is changed to 0.
28
Exclusive OR (XOR)
* Returns a true value when only one of the input variables is true. * In case that both variables are false or both variables are true, XOR output will be false.
29
Modulo Function
* Finds a reminder of division of one number by another.
30
One- Way Functions
* Operation that produces output values for all the possible combinations of a particular set of input variables. * However, it makes it impossible to retrieve the input variables.
31
Nonce
* It is an arbitrary number that serves as a proxy variable in a mathematical function.
32
Zero- Knowledge Proof
* Method by which one party can prove knowledge of a certain fact to another party without revealing the actual fact.
33
Split Knowledge
* Information to perform a certain operation is split among users in such way that no single user has sufficient knowledge to compromise the security.
34
Work Function
* A way to measure the strength of a particular cryptosystem. * The protection provided by a cryptosystem is directly correlated to its work factor/function.
35
Code vs Cipher
* Code refers to symbol that may be used to substitute a word/phrase and does not necessarily provide confidentiality, while cipher is always meant to conceal data/information and provide confidentiality.
36
Transposition Ciphers
* Algorithms used to transform plaintext into ciphertext.
37
Substitution Ciphers
* Encryption method that substitutes every character in a plaintext with a different character.
38
One-Time Pad
* Encryption method that uses different substitution alphabet for each character in a plaintext. It uses a key that is at least long as the message.
39
Running Key Ciphers (Book Ciphers)
* Encryption key used is at least as long as a message and it is taken from a common book.
40
Block Ciphers
* It is an encryption algorithm operating on a fixed number of bits, called a block.
41
Stream Ciphers
* It is a key cipher that operates on one bit of a message or on one character at the time.
42
Confusion
* An extremely complicated relationship between the plaintext and key that makes it impossible for the attacker to determine the key by changing the plaintext and analysing the its ciphertext.
43
Diffusion
* One change in plaintext leads to multiple changes in the ciphertext.
44
Weaknesses of Symmetric Cryptography
* Key distribution * Does not implement nonrepudiation * Algorithm is not scalable * Keys are to be regenerated often
45
Strengths of Asymmetric Cryptography
* Addition of new users requires generation of only one key pair * User are more easily removed from the system * Key regeneration is required only when a private key is compromised * Provides integrity, authentication, and nonrepudiation * Key distribution is simple * Pre-existing communication link does not need to exist
46
Data Encryption Standard
* 64-bit block cipher that was proposed in 1977 by the US government as a standard cryptosystem to be used for all government communication. * No longer considered to be secure.
47
DES - Five Modes of Operation
* Electronic Code Book mode * Cipher Block Chaining mode * Cipher Feedback mode * Output feedback mode * Counter mode
48
Electronic Code Book Mode
* Mode of operation that for every processed 64-bit block produces an encrypted block using the secret key.
49
Cipher Block Chaining Mode
* Mode of operation that XORs each block of unencrypted text with the ciphertext preceding and then it encrypts it using DES algorithm.
50
Cipher Feedback Mode
* Mode of operation that works against data produced in real time.
51
Output Feedback Mode
* Mode of operation that XORs plaintext with a seed value.
52
Counter Mode
* Mode of operation similar to CFB and OFB; uses a simple counter increments for each operation.
53
Triple DES
* Adapted version of DES that uses three different keys.
54
International Data Encryption Algorithm (IDEA)
* Algorithm that begins the operation with a 128-bit key which is then broken up into 52 16-bit subkeys. These keys then act on input text using XOR and mode of operations to produce cryptographic version of the message.
55
Blowfish
* Expands on the IDEA principle as it allows the use of variable lengths keys ranging from 32-bit to 448-bit.
56
Skipjack
* Algorithm that operates on 64-bit blocks, uses and 80-bit key, and uses the same modes of operation as DES. * It also supports escrows of encryption keys.
57
Advanced Encryption Standard
* Block cipher that has been chosen to replace DES. * It uses three keys of different strengths: 128 bit, 192 bit, and 256 bit.
58
Key Management Practices
* Safeguards around secret key creation, distribution, storage, destruction, recovery, and escrow.
59
Symmetric Key Exchange
* Offline distribution * Public key encryption * Diffie-Hellman key exchange algorithm
60
Symmetric Key Storage and Destruction Principles
* Never store the encryption key in the same site where encrypted data is located * Provide two different individuals with half of the key
61
Key Escrow Approaches
* Fair cryptosystems * Escrowed encryption standard
62
Fair Cryptosystems
* Secret keys are divided into 2 or more pieces and given to a third party.
63
Escrowed Encryption Standard
* Basis behind Skipjack; it provides governments with the ability to decipher encrypted data.
64