2.8 Basic Cryptographic Concepts Flashcards

1
Q

An unencrypted message (in the clear)

A

Plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An encrypted message

A

Ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The algorithm used to encrypt/decrypt a message

A

Cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The art of cracking encryption

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or false: Larger encryption keys are generally more secure.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or false: All encryption methods only use a single key.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can a small encryption key be used to make a stronger encryption?

A

Apply the key multiple times (stretching)

i.e. Hash a password. hash the hash. etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Applications designed to take small keys and perform repetitive hashing with them in order to create stronger hashes.

A

Stretching libraries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

New standard of cryptography designed for IoT devices that have limited compute power.

A

Lightweight cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption method intended to perform calculations on data while it is still encrypted. Assists with secure data stored in the cloud.

A

Homomorphic encryption (HE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption method that uses one single key for encryption and decryption. Does not scale well but is fast with little overhead.

A

Symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Public key cryptography. Involves two or more mathematically related keys, one public and one private.

A

Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A form of asymmetric cryptography that uses large integers compose of two or more prime factors. Uses smaller keys and requires less storage. Good for mobile devices.

A

Elliptic curve cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Known as a message digest and is a short string of text that represents a set of data.

A

Hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one way to use hashing to verify downloaded files from a website?

A

Compare the hash on your downloaded content to the hash on the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or false: When salting passwords, everybody gets a different salt stored with their password.

A

True

17
Q

Created using the private key and serves to prove that a piece of data was not changed, the source, and verify that it’s not fake

A

Digital signature

18
Q

True or false: Cryptographic algorithms are largely unknown entities

A

False

19
Q

Which encryption method has larger keys: symmetric or asymmetric?

A

Asymmetric

20
Q

What is a common length of key to see with asymmetric encryption?

A

3,072 bits or larger

21
Q

An encryption method that generates a session key on a server which allows a symmetric key to be sent via asymmetric encryption.

A

Real-time encryption

22
Q

Method of web traffic encryption that doesn’t use RSA keys. Uses elliptic curve or Diffie-Hellman and keys are not kept around. Requires more computing power and server/web browser must be compatible.

A

Perfect forward secrecy (PFS)

23
Q

The process of obscuring code in order to secure it.

A

Stenography

24
Q

Stenography technique which embeds messages into TCP packets.

A

Network Stenography

25
Q

What is the goal of all the different stenography types (network, image, audio, watermarks, etc.)

A

Hiding a message within the given media

26
Q

New type of computing that utlizes qubits as the smallest data form rather than bits with traditional computing.

A

Quantum computing

27
Q

What are some tasks quantum computing can tackle?

A

Quickly searching/indexing large databases

Simulating the quantum world (medical, weather, physics)

28
Q

How does quantum computing break existing crytpography much quicker than traditional computing methods?

A

It can quickly factor prime numbers

29
Q

This algorithm was created in 1994 to find prime factors of an integer N. Would take traditional computing longer than the age of the universe in order to solve.

A

Shor’s Algorithm

30
Q

A cryptosystem using lattice theory and relies on the “closest vector” problem.

A

NTRU

31
Q

Cipher type:

  • Encryption is done one bit/byte at a time
  • Used with symmetric encryption
  • Starting state should never be the same twice (initialization vector)
A

Stream cipher

32
Q

Cipher type:

  • fixed-length encryption groups
  • 64 or 128 bit blocks
  • Symmetric encryption
A

Block cipher

33
Q

The simplest encryption mode where each block is encrypted with the same key every time. Identical plaintext blocks create identical ciphertext.

A

Electronic code book (ECB)

34
Q
A
35
Q
A
36
Q
A
37
Q
A