4.1 - Cryptography Primer Flashcards

(27 cards)

1
Q

What is Cryptography?

A

Converting communications into a form that can only be read by the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Public Key Infrastructure (PKI)?

A

A system (consisting of programs, data formats, procedures, communication protocols, security policies) that uses digital certificates and public key encryption to secure communications and establish trust between entities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 4 cryptographic solutions?

A

Encryption, hashing, digital signatures, and digital certifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is encryption?

A

Process of encoding information

Use case: Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Hashing?

A

A one way function that turns a file or string of text into a unique digest of the message

Use case: Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are digital signatures?

A

A hash value encrypted using the sender’s private key

Use case: Sender authenticity and non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are digital certificates?

A

A digital object that is tied to a cryptographic key pair

Use case: authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a cipher?

A

A technique that transforms plaintext into cipher text and back to plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is plain text?

A

Human readable text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is cipher text?

A

Encrypted/not human readable text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an algorithm

A

A mathematically complex modern cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a key (cryptovariable)?

A

A secret value used with an algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a stream cipher?

A

An algorithm that works on one bit of data at a time using XOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a block cipher?

A

An algorithm that works on blocks of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a confusion?

A

Process of changing the values. Complex substitution functions are used to create confusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a diffusion?

A

Process of changing the order. Sending bits through multiple rounds of transportation is used to create diffusion

17
Q

What is a key space?

A

Number of possible key combinations

18
Q

What is key stretching?

A

A technique to strengthen a weak key to protect against brute force attacks

19
Q

What is a symmetric key?

A

A single shared key used for both encryption and decryption

20
Q

What is an asymmetric key?

A

Two mathematically related keys are used for encryption and decryption. This has to be used as a pair

21
Q

How can we ensure the secrecy of the keys?

A

Trusted platform module (TPM), secure enclave, hardware security module (HSM), key escrow

22
Q

What is trusted platform module (TPM)

A

A hardware chip used for storing cryptographic keys and related information

23
Q

What is secure enclave?

A

A seperate processor and microkerner used for storing and processing cryptographic keys and related information in moblie devices

24
Q

What is hardware security module (HSM)?

A

Hardened, tamper resistant hardware devices that secure cryptographic keys and related information

25
What is a key escrow?
A safekeeping mechanism for storing and obtaining copied of the keys needed to decrypt encrypted data, under certain circumstances
26
What is the meaning of deprecated?
The use of algorithms and key lengths is allowed, but the user must accept some risk due to inherent weaknesses e.g. 3DES
27
What is the meaning of broken?
That the algorithm and/or key length is exploitable