2.8 Summarize the basics of cryptographic concepts Flashcards

1
Q

Digital signatures

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Key length

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Key stretching

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Salting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hashing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Key exchange

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Elliptic-curve cryptography

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Perfect forward secrecy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Quantum
-Communications

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Quantum
-Computing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Post-quantum

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ephemeral

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Modes of operation
-Authentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Modes of operation
-Unauthentication

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Modes of operation
-Counter

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Blockchain
-Public ledgers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cipher suites
-Stream

18
Q

Cipher suites
-Block

19
Q

Symmetric vs asymmetric

20
Q

Lightweight cryptography

21
Q

Steganography
-Audio

22
Q

Steganography
-Video

23
Q

Steganography
-Image

24
Q

Homomorphic encryption

25
Common use cases -Low power devices
26
Common use cases -Low latency
27
Common use cases -High resiliency
28
Common use cases -Supporting confidentiality
29
Common use cases -Supporting integrity
30
Common use cases -Supporting obfuscation
31
Common use cases -Supporting authentication
32
Common use cases -Supporting non-repudiation
33
Limitations -Speed
34
Limitations -Size
35
Limitations -Weak keys
36
Limitations -Time
37
Limitations -Longevity
38
Limitations -Predictability
39
Limitations -Reuse
40
Limitations -Entropy
41
Limitations -Computational overheads
42
Limitations -Resource vs security constraints