Section 24 Cryptography Flashcards

1
Q

The practice and study of writing and solving codes in order to hide the true meaning of information.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Process of converting ordinary information (plaintext) into an unintelligible form (ciphertext).

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Inactive data that is archived, such as data resident on a hard disk drive.

A

Data at Rest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data crossing the network or data that resides in a computer’s memory.

A

Data in Transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data that is undergoing constant change.

A

Data in Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The essential piece of information that determines the output of a cipher.

A

Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption algorithm in which both the sender and the receiver must know the same secret using a privately held key.

A

Symmetric Encryption (Private Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption algorithm where different keys are used to encrypt and decrypt the data.

A

Asymmetric Encryption (Public Key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Utilizes asymmetric encryption to securely transfer a private key that can then be used with symmetric encryption.

A

Hybrid Implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Utilizes a keystream generator to encrypt data bit by using a mathematical XOR function to create the ciphertext.

A

Stream Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Breaks the input into fixed length blocks of data and performs the encryption on each block.

A

Block Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encryption algorithm which breaks the input into 64 bit blocks and uses transportation and substitution to create ciphertext using an effective key strength of only 56 bits.

A

Data Encryption Standard (DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption algorithm which sues three separate symmetric keys to encrypt, symmetric keys to encrypt, decrypt, then encrypt the plaintext into ciphertext in order to increase the strength of DES.

A

Triple DES (3 DES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric block cipher which uses 64 bit to encrypt plaintext into ciphertext.

A

International Data Encryption Algorithm (IDEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Symmetric block cipher that uses 128 bit, 192 bit, or 256 bit blocks and a matching encryption key size to encrypt plain text into ciphertext.

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Symmetric block cipher that uses 64 bit blocks and a variable length encryption key to encrypt plaintext into ciphertext.

A

Blowfish

17
Q

Symmetric block cipher that replaced blowfish and uses 128 bit blocks and a 128 bit, 192 bit, or 256 bit encryption key to encrypt plaintext into ciphertext.

A

Twofish

18
Q

Symmetric stream cipher using a variable key size from 40 bits to 2048 bits that is used in SSL and WEP.

A

Rivest Cipher (RC 4)

19
Q

Symmetric block cipher with a key sizes up to 2048 bits.

A

Rivest Cipher (RC 5)

20
Q

Symmetric block cipher that was introduced as a replacement for DES but AES was chosen instead.

A

Rivest Cipher (RC 6)

21
Q
  1. Confidentiality
  2. Authentication
  3. Integrity
  4. Non-Repudiation
A

Public Key Cryptography Provides

22
Q

A hash digest of a message encrypted with the senders private key to let the recipient know the document was created and sent by the person claiming to have sent it.

A

Digital Signature

23
Q

Used to conduct key exchanges and secure key distribution over an unsecured network.

A

Diffie-Hellman (DH)

24
Q

Asymmetric algorithm that relies on the mathematical difficulty of factoring large prime numbers.

A

RSA (Rivest, Shamir, and Adleman)

25
Q

Algorithm that is based upon the algebraic structure of elliptic curves over finite fields to define the keys.

A

Elliptic Curve Cryptography (ECC)

26
Q

An encryption program used for signing, encrypting, and decrypting emails.

A

Pretty Good Privacy (PGP)

27
Q

A newer and updated version of the PGP encryption suite that uses AES for it’s symmetric encryption functions.

A

GNU Privacy Guard (GPG)

28
Q

Refers to how an organizations will generate, exchange, store, and use encryption keys.

A

Key Management

29
Q

A stream cipher that encrypts plaintext information with a secret random key that is the same length as the plaintext input.

A

One Time Pad

30
Q

A simulated random number stream generated by a computer that is used in cryptography, video games, and more.

A

Pseudo Random Number Generator (PRNG)

31
Q

The science and art of hiding messages within other messages.

A

Steganography

32
Q

A shared, immutable ledger for recording transactions, tracking assets and building trust.

A

Blockchain

33
Q

A record keeping system that maintains participants identities in secure and anonymous form, their respective cryptocurrency balances, and a record book of all the genuine transactions executed between network participants.

A

Public Ledger

34
Q

A computer that uses quantum mechanics generate and manipulate quantum bits (qubits) in order to access enormous processing powers.

A

Quantum Computing

35
Q

A communications network that relies on qubits made of photons (lights) to send multiple combinations of ls and Os simultaneously which results in tamper resistant and extremely fast communications.

A

Quantum Communication

36
Q

A quantum bit compromised of electrons or photons that can represent numerous combinations of ls and Os at the same time through superposition.

A

Qubit

37
Q

A cryptographic key that is generated for each execution of a key establishment process.

A

Epherneral

38
Q

An encryption method that allows calculations and be performed on data without decrypting it first.

A

Homomorphic Encryption