2.8 Summarize the basics of cryptographic concepts Flashcards

1
Q

Digital signatures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key length

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key stretching

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Salting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key exchange

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Elliptic-curve cryptography

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Perfect forward secrecy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Quantum
-Communications

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Quantum
-Computing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Post-quantum

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ephemeral

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Modes of operation
-Authentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Modes of operation
-Unauthentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Modes of operation
-Counter

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Blockchain
-Public ledgers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cipher suites
-Stream

A
18
Q

Cipher suites
-Block

A
19
Q

Symmetric vs asymmetric

A
20
Q

Lightweight cryptography

A
21
Q

Steganography
-Audio

A
22
Q

Steganography
-Video

A
23
Q

Steganography
-Image

A
24
Q

Homomorphic encryption

A
25
Q

Common use cases
-Low power devices

A
26
Q

Common use cases
-Low latency

A
27
Q

Common use cases
-High resiliency

A
28
Q

Common use cases
-Supporting confidentiality

A
29
Q

Common use cases
-Supporting integrity

A
30
Q

Common use cases
-Supporting obfuscation

A
31
Q

Common use cases
-Supporting authentication

A
32
Q

Common use cases
-Supporting non-repudiation

A
33
Q

Limitations
-Speed

A
34
Q

Limitations
-Size

A
35
Q

Limitations
-Weak keys

A
36
Q

Limitations
-Time

A
37
Q

Limitations
-Longevity

A
38
Q

Limitations
-Predictability

A
39
Q

Limitations
-Reuse

A
40
Q

Limitations
-Entropy

A
41
Q

Limitations
-Computational overheads

A
42
Q

Limitations
-Resource vs security constraints

A