Lesson 5 - Basic Cryptography Concepts Flashcards

1
Q

Plaintext (or cleartext)

A

an unencrypted message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ciphertext

A

an encrypted message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cipher

A

the process (or algorithm) used to encrypt and decrypt a message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cryptanalysis

A

the art of cracking cryptographic systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing

A

A cryptographic hashing algorithm produces a fixed-length string from an input plaintext that can be of any length. The output can be referred to as a checksum, message digest, or hash,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Secure Hash Algorithm (SHA)

A

considered the strongest algorithm. SHA-256, which produces a 256-bit digest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Message Digest Algorithm #5 (MD5)

A

produces a 128-bit digest. MD5 is not considered to be quite as safe for use as SHA-256, but it might be required for compatibility between security products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A symmetric cipher

A

is one in which encryption and decryption are both performed by the same secret key. Also used for confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Two types of symmetric encryption:

A

stream ciphers and block ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Stream cipher

A

each byte or bit of data in the plaintext is encrypted one at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block cipher

A

the plaintext is divided into equal-size blocks (usually 128-bit).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Advanced Encryption Standard (AES)

A

is the default symmetric encryption cipher for most products. Basic AES has a key size of 128 bits, but the most widely used variant is AES256, with a 256-bit key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

asymmetric cipher

A

operations are performed by two different but related public and private keys in a key pair.

asymmetric encryption is mostly used for authentication and non-repudiation and for key agreement and exchange.

Asymmetric encryption is often referred to as public key cryptography.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Elliptic curve cryptography (ECC)

A

is another type of trapdoor function that can be used in public key cryptography ciphers.

The principal advantage of ECC over RSA’s algorithm is that there are no known “shortcuts” to cracking the cipher or the math that underpins it, regardless of key length.

Consequently, ECC used with a key size of 256 bits is very approximately comparable to RSA with a key size of 2048 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

digital signature

A

is a hash that is then encrypted using a private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

public key infrastructure (PKI)

A

The process of issuing and verifying certificates

17
Q

This risk from RSA key exchange is mitigated by:

perfect forward secrecy (PFS).

A

PFS uses Diffie-Hellman (D-H) key agreement to create ephemeral session keys without using the server’s private key.

18
Q

Cipher Block Chaining (CBC) mode

A

applies an initialization vector (IV) to the first plaintext block to ensure that the key produces a unique ciphertext from any given plaintext.

19
Q

Counter mode makes the AES algorithm work as a stream cipher.

A

Counter mode applies an IV plus an incrementing counter value to the key to generate a keystream. The keystream is then XOR’ed to the data in the plaintext blocks

20
Q

AEAD

A

Authenticated Encryption with Additional Data

In an AEAD scheme, the associated data allows the receiver to use the message header to ensure the payload has not been replayed from a different communication stream.

21
Q

Cryptographic primitive

A

a single hash function, symmetric cipher or asymmetric cipher. It uses multiple cryptographic primitives such as within a cipher suite.

22
Q

basic hash function

A

A basic hash function can also be used with a shared secret to create a message authentication code (MAC), which prevents a man-in-the-middle tampering with the checksum.

23
Q

Entropy

A

is a measure of disorder. A plaintext will usually exhibit low entropy as it represents a message in a human language or programming language or data structure

24
Q

Nonce

A

the principal characteristic of a nonce is that it is never reused (“number used once”) within the same scope (that is, with the same key value).

25
Q

Initialization vector (IV)

A

the principal characteristic of an IV is that it be random (or pseudo-random).

26
Q

Salt

A

this is also a random or pseudo-random number or string. The term salt is used specifically in conjunction with hashing password values.

Salt means that an attacker cannot use pre-computed tables of hashes.

27
Q

longevity

A

is the consideration of how long data must be kept secure.

28
Q

A downgrade attack

A

can be used to facilitate a man-in-the-middle attack by requesting that the server use a lower specification protocol with weaker ciphers and key lengths.

29
Q

Key stretching

A

takes a key that’s generated from a user password and repeatedly converts it to a longer and more random key

30
Q

A birthday attack

A

is a type of brute force attack aimed at exploiting collisions in hash functions.

31
Q

collision

A

is where a function produces the same hash value for two different plaintexts. This type of attack can be used for the purpose of forging a digital signature.

32
Q

Quantum

A

refers to computers that use properties of quantum mechanics to significantly out-perform classical computers at certain tasks.

33
Q

cryptographic agility

A

refers to an organization’s ability to update the specific algorithms used across a range of security products without affecting the business workflows that those products support

34
Q

Homomorphic encryption

A

is principally used to share privacy-sensitive data sets.

35
Q

Blockchain

A

is a concept in which an expanding list of transactional records is secured using cryptography

36
Q

Steganography (literally meaning “hidden writing”)

A

is a technique for obscuring the presence of a message.