2.8 Summarize the basics of cryptographic concepts Flashcards
1
Q
Digital signatures
A
2
Q
Key length
A
3
Q
Key stretching
A
4
Q
Salting
A
5
Q
Hashing
A
6
Q
Key exchange
A
7
Q
Elliptic-curve cryptography
A
8
Q
Perfect forward secrecy
A
9
Q
Quantum
-Communications
A
10
Q
Quantum
-Computing
A
11
Q
Post-quantum
A
12
Q
Ephemeral
A
13
Q
Modes of operation
-Authentication
A
14
Q
Modes of operation
-Unauthentication
A
15
Q
Modes of operation
-Counter
A
16
Q
Blockchain
-Public ledgers
A
17
Q
Cipher suites
-Stream
A
18
Q
Cipher suites
-Block
A
19
Q
Symmetric vs asymmetric
A
20
Q
Lightweight cryptography
A
21
Q
Steganography
-Audio
A
22
Q
Steganography
-Video
A
23
Q
Steganography
-Image
A
24
Q
Homomorphic encryption
A
25
Common use cases
-Low power devices
26
Common use cases
-Low latency
27
Common use cases
-High resiliency
28
Common use cases
-Supporting confidentiality
29
Common use cases
-Supporting integrity
30
Common use cases
-Supporting obfuscation
31
Common use cases
-Supporting authentication
32
Common use cases
-Supporting non-repudiation
33
Limitations
-Speed
34
Limitations
-Size
35
Limitations
-Weak keys
36
Limitations
-Time
37
Limitations
-Longevity
38
Limitations
-Predictability
39
Limitations
-Reuse
40
Limitations
-Entropy
41
Limitations
-Computational overheads
42
Limitations
-Resource vs security constraints