2.b. Cryptography Flashcards

1
Q

Cryptography

A

The science of protecting the confidentiality and integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cryptographic algorithms

A

Convert plain text into cipher text. Some work in both directions and some act as an integrity check (1 way function)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cryptanalysis

A

Breaking and finding a weakness in the algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ceasar Cipher

A

Shifting each letter of plaintext by a certain number of spaces in the alphabet (3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ROT13 Cipher

A

Variation of the Ceasar Cypher where each letter in the alphabet is shifted 13 spaces. If you run the code through the ROT13 cipher 2X, you get the original message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptographic Machine examples

A

Jefferson Disk (purely mechanical 36 disks) and the German Enigma Machine (series of rotors each with 26 letters and 26 electrical contacts on them)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Kerckhoffs’s Principles (6) - Bases for cryptographic systems

A
  1. System must be substantially, if not mathematically, undecipherable
  2. System must not require secrecy (secure even if stolen)
    3.Keys must be easy to communicate and remember w/o written notes, and must be easy to change/modify
  3. System ought to be compatible w/ communication via telegraph
  4. System must be portable and must not require more than 1 person
  5. System must be easy to use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Open Algorithms - One-way problems

A

Depends on complex mathematical problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Keyword Ciphers - Substitution Ciphers

A

ABCDEFGHIJKLMNOPQRSTUVWXYZ
MYSECRTABDFGHIJKLNOPQUVWXZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

One-Time-Pad - Vernam Cipher

A

2 copies of the same pad containing a random set of numbers (shifts) which are the key. Each shift is the number of letters forward in the alphabet you’d shift the plaintext letter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Block Cipher

A

Takes a predetermined number of bits (block) and encrypts that block (typically 1 block = 64 bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Stream Cipher

A

Encrypts each bit of plaintext one bit at a time A block cipher with block size set to 1 bit acts as a stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Symmetric Cryptography

A

PRIVATE KEY cryptography uses a single key to encrypt and decrypt (uses key exchange)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Symmetric key algorithms Exs

A

DES, 3DES, AE5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DES

A

(Symmetric) Block cipher that uses 56 bit key (keyspace 2^56)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3DES

A

(Symmetric) DES used to encrypt each block 3X w/ 3 different keys. Slower than AES

17
Q

AES

A

(Symmetric) Set of 3 symmetric block ciphers. A 128 bit, 192 bit, and 256 bit key. All 3 encrypt blocks of 128 bits.

18
Q

Block Symmetric Cryptography Exs

A

Twofish, Serpent, Blowfish, CAST5, RC6, IDEA

19
Q

Stream Symmetric Cryptography Exs

A

RC4, ORYX, SEAC

20
Q

Asymmetric Cryptography

A

PUBLIC KEY cryptography uses 2 keys - 1 public and 1 private. The public key encrypts while the private key decrypts

21
Q

S.S.L. Protocol

A

Secure Sockets Layer Protocol

22
Q

E.C.C. Cryptography

A

Elliptic Curve Cryptography uses short keys. It is fast and efficient. Easy to implement on hardware that has less processing power/memory.

23
Q

Hash Functions - Keyless cryptography

A

Can’t use hash to get the original message or characteristics, but you can use it to determine if a message has changed

24
Q

Certificates (C.A.)

A

Certificate Authority - Created to link a public key to an individual.
Ex: VeriSign

25
Q

W.A.N.

A

Wide Area Network

26
Q

L.A.N.

A

Local Area Network

27
Q

IMAP

A

Internet Message Access Protocol (email)

28
Q

POP

A

Post Office Protocol (email)

29
Q

HTTP

A

Hypertext Transfer Protocol (Web Traffic)

30
Q

VoIP

A

Voice messaging and IM

31
Q

SSL and TLS

A

To encrypt a connection between 2 systems communicating over a network