2.8 Summarize the basics of cryptographic concepts. Flashcards

(34 cards)

1
Q

Cipher Text

A

encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cipher

A

Algorithm used to encrypt and/ or decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptanalysis

A

Finding vulnerabilities in ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crypto graphic Key

A

A KEY added to the end the cipher to encrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Key Stretching

A

encrypting a key multiple times to strength the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Bcrypt

A

Key stretching library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PBKDF2

A

Key stretching library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Lightweight cryptography

A

Used for IoT cryptography that has limited resources to encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Homomorphic encryption (HE)

A

Preform calculations on a algorithm with decrypting the data.

Saves the encrypted result.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Symmetric Encryption

A

(Shared Secret)
Only using one key to decrypt and encrypt data.
If the key becomes known to unauthorized parties then you have to redo your encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Encryption

A

Two or more different keys Public and Private.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Private Key and Public Key

A

Key you only have and a key everyone can see
Both mathematically related

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EEC

A

Elliptic curve cryptography

IoT use curves for Asymmetric encryption because they don’t have the computing power for it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Digital Signatures

A

Cryptography/encryption combined with Hashing

Authentication non-repudiation, and integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Collison

A

When two hashes have the same out put

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SHA256

A

Hash Algorithm

17
Q

Salt

A

Added data added to a Hash.
Users that have the same password have the same hash. adding Salt combat that

18
Q

Key Length

A

Longer a Key the stronger the key
Asymmetric 3,072 bit
Symmetric key 128 bit

19
Q

Key exchange

A

Out-of-band - transfer/sending a key off the Network

In-band - Sending a key on the Network

20
Q

Ephemeral Key

A

A key that is only used once.

21
Q

PFS

A

Perfect Forward Secrecy
A system that allows you not be compromised by not using the same key twice ever.
Prevents people from getting your server key.

22
Q

Steganography

A

Hide code code through a image, audio, video.
Not a true secure message.

23
Q

Quantum Computing

A

Computing- doesn’t use bit like regular computer. Quantum computing uses Qubits and the value is between 0-1.

24
Q

Post-Quantum

A

Current Algorithm that we you today for cryptography can be easily solved by quantum computers.

NTRU slows down quantum cryptography

25
Quantum Communication or QKD
Quantum Key Distribution- Creates unbreakable encryption that you can send in the network without being decrypted. If there is eavesdropping the key would authenticate.
26
Stream Ciphers
Encrypts one bit/byte at a time Symmetric encryption
27
Block Cipher
Encrypts a entire block if there isn't a enough data the data will be added to make a 64 byte (Padding)
28
Modes of Operation
29
ECB
Electronic Code Book uses a single Encryption key and uses that for each identical plaintext block encryption
30
CBC
Cipher Clock Chaining Right before Plaintext block is "keyed" a IV (initialization vector) is added before hand. After that the cipher block is then used in the same place as the IV. This allows randomization
31
CTR
Counter or Counter Mode Top: Unencrypted Counter Second: Key Third: Plaintext added to the block Bottom: Cipher Text
32
GCM
Galois/Counter Mode Adding authentication the mode of operation
33
Block Chain
A list of records, when something is added it is done by a cryptographic algorithm Resistant to modification
34