2.8 Summarize the basics of cryptographic concepts. Flashcards

1
Q

Cipher Text

A

encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher

A

Algorithm used to encrypt and/ or decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptanalysis

A

Finding vulnerabilities in ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crypto graphic Key

A

A KEY added to the end the cipher to encrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Stretching

A

encrypting a key multiple times to strength the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bcrypt

A

Key stretching library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PBKDF2

A

Key stretching library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lightweight cryptography

A

Used for IoT cryptography that has limited resources to encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Homomorphic encryption (HE)

A

Preform calculations on a algorithm with decrypting the data.

Saves the encrypted result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Symmetric Encryption

A

(Shared Secret)
Only using one key to decrypt and encrypt data.
If the key becomes known to unauthorized parties then you have to redo your encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Encryption

A

Two or more different keys Public and Private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Private Key and Public Key

A

Key you only have and a key everyone can see
Both mathematically related

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EEC

A

Elliptic curve cryptography

IoT use curves for Asymmetric encryption because they don’t have the computing power for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital Signatures

A

Cryptography/encryption combined with Hashing

Authentication non-repudiation, and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Collison

A

When two hashes have the same out put

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SHA256

A

Hash Algorithm

17
Q

Salt

A

Added data added to a Hash.
Users that have the same password have the same hash. adding Salt combat that

18
Q

Key Length

A

Longer a Key the stronger the key
Asymmetric 3,072 bit
Symmetric key 128 bit

19
Q

Key exchange

A

Out-of-band - transfer/sending a key off the Network

In-band - Sending a key on the Network

20
Q

Ephemeral Key

A

A key that is only used once.

21
Q

PFS

A

Perfect Forward Secrecy
A system that allows you not be compromised by not using the same key twice ever.
Prevents people from getting your server key.

22
Q

Steganography

A

Hide code code through a image, audio, video.
Not a true secure message.

23
Q

Quantum Computing

A

Computing- doesn’t use bit like regular computer. Quantum computing uses Qubits and the value is between 0-1.

24
Q

Post-Quantum

A

Current Algorithm that we you today for cryptography can be easily solved by quantum computers.

NTRU slows down quantum cryptography

25
Q

Quantum Communication or
QKD

A

Quantum Key Distribution-
Creates unbreakable encryption that you can send in the network without being decrypted.

If there is eavesdropping the key would authenticate.

26
Q

Stream Ciphers

A

Encrypts one bit/byte at a time
Symmetric encryption

27
Q

Block Cipher

A

Encrypts a entire block
if there isn’t a enough data the data will be added to make a 64 byte (Padding)

28
Q

Modes of Operation

A
29
Q

ECB

A

Electronic Code Book
uses a single Encryption key and uses that for each identical plaintext block encryption

30
Q

CBC

A

Cipher Clock Chaining

Right before Plaintext block is “keyed” a IV (initialization vector) is added before hand.
After that the cipher block is then used in the same place as the IV.
This allows randomization

31
Q

CTR

A

Counter or Counter Mode
Top: Unencrypted Counter
Second: Key
Third: Plaintext added to the block
Bottom: Cipher Text

32
Q

GCM

A

Galois/Counter Mode
Adding authentication the mode of operation

33
Q

Block Chain

A

A list of records, when something is added it is done by a cryptographic algorithm

Resistant to modification

34
Q
A