2.8 cryptographic concepts Flashcards

1
Q

ciphertext

A

encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

cipher

A

algorithm to encrypt/decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cryptanalysis

A

art of encryption cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

homomorphic encryption

A

a cryptographic technique that allows computations to be performed on encrypted data without requiring decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

symmetric encryption

A

a technique that uses a single key to encrypt and decrypt data
- does not scale well
- very fast to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

asymmetric encryption

A

two key system
Public key: Used for encryption
Private key: Used for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Elliptic Curve Cryptography

A

asymmetric encryption uses curves instead of numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hash Collision

A

when two different pieces of data produce the same hash value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

key exchange

A

a cryptographic process that allows two parties to exchange keys. This allows them to use the keys to share encrypted information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Perfect Forward Secrecy

A

Perfect Forward Secrecy
a type of encryption that automatically and frequently changes the keys used to encrypt and decrypt information.
SSL/TLS feature
more computing power and must be supported by browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

steganography

A

the practice of concealing information within another message or physical object to avoid detection
message is invisible
- hide message in TCP packets
- embed in image
- invisible watermarks
- audio
- video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

cipher stream

A

one byte at a time
high speed, low hardware
symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

cipher block

A

encrypts a block of bytes at one time
64-128 bits
symmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

CBC

A

cipher block chaining
add randomization via IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

initialization vector (IV)

A

This is a block of bits that randomizes the encryption. It produces distinct ciphertexts even if the same plaintext is encrypted multiple times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

XOR

A

eXclusive OR
adds randomization
symmetric encryption

17
Q

crypto use cases

A
  • Low power devices
  • Low latency
  • High resiliency
  • Supporting confidentiality
  • Supporting integrity
  • Supporting obfuscation
  • Supporting authentication
  • Supporting non-repudiation
18
Q

crypto limitations

A
  • Speed
  • Size
  • Weak keys
  • Time
  • Longevity
  • Predictability
  • Reuse
  • Entropy
  • Computational overheads
  • Resource vs. security constraints
19
Q

symmetric key creation

A

use a public and private key to create a symmetric key

20
Q

PFS

A

perfect forward secrecy

an encryption system that automatically and frequently changes the keys used to encrypt and decrypt information.

21
Q

ephemeral

A

involves the use of cryptographic keys that are generated for each execution of a key establishment process. These keys are also known as session keys.

22
Q

AE

A

Authenticated Encryption
specialized block cipher modes of operation

23
Q

lightweight cryptography

A

a type of encryption that’s designed for devices with limited resources such as IoT.