6.1 Compare and contrast basic concepts of cryptography. Flashcards

1
Q

Encryption gives you ______

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Digital Signatures give you __________

A

Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hashing gives you _____

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption definition

A

A cryptographic technique that converts data from plaintext (cleartext) into code (ciphertext)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ciphers

A

A specific set of actions used to encrypt data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptanalysis

A

The science of breaking codes and ciphers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

One-way Function

A

Mathematical operation that easily produces an output for each possible combination of inputs but makes it impossible to retrieve input values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Symmetric Algorithms

A

A single, shared key, secret-key, private-key encryption.
Used to encrypt large sized bulk data.
**Encrypt and decrypt with the same shared, secret key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

to protect passwords they are _____ before being stored

A

HASHed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

drawback to Symmetric Algorithms

A

Doesn’t scale well (Key Distribution)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Asymmetric Algorithms

A

a pair of public and private key.
uses public key to encrypt it
uses private key to decrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Private key

A

– Used by you to Decrypt messages to you
– Must keep private
– Never give out your Private Key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Public key

A

– Used by others to encrypt messages to you.
– Everyone you want to has access to your Public Key.
– Located on the CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Public Key Infrastructure (PKI) pertains to two things for the test.

A
  • Digital certificates used to verify websites

- Asymmetric encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hashing

A
  • Used to store passwords
  • Used to verify INTEGRITY
  • Also called Message digest, checksum, hash value
  • Used in Digital Signatures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Nonce

A

imply a number that is used only once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

IV (Initialization Vector)

A
  • A random number used in combination with a secret key as a means to encrypt data.
  • Sometimes referred to as a nonce
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Salt

A

A random string of data used to modify a password hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Elliptic Curve

A

ECC is a public-key cryptosystem based upon complex mathematical equations of elliptic curves.

ECC uses smaller key sizes than traditional public-key cryptosystem.

As a result, it is faster and consumes fewer resources, making it more ideal for mobile and wireless devices.

20
Q

PAD a ______

A

Password

21
Q

SALT a _____

A

HASH

22
Q

ECC - Elliptic Curve

A

Used for CellPhones

23
Q

on test question about the military going to the field and you must encrypt cell phones. What encryption standard are you going to use

A

SHA256

24
Q

Key Exchange

A

Can use IKE - pre-existing VPN tunnel - IN-Band

Can setup a new VPN tunnnel just to send keys - ISAKMP - OUT-of-Band

25
Q

Digital Signatures

A

Sender signs using their Private key

Supports both Integrity and Nonrepudiation

Receiver decrypts the hash and verifies the data with the sender’s Public key

26
Q

Diffusion

A

A change in one bit on input has drastic changes in output

27
Q

Collision

A

Happens when two different messages produce the same hash value.

28
Q

Steganography

A

The process of hiding a message in a medium such as a digital image, audio file, or other file.

29
Q

Program for steganography

A

– QuickStego

– Snow

30
Q

Obfuscation

A

The action of making something obscure, unclear, or unintelligible. TO HIDE

31
Q

What two ways can you tell something is hidden inside another file?(steganography)

A

the HASH value

or TripWire

32
Q

Block Cipher

A

encrypting a block of data at a time

33
Q

stream cipher

A

encrypts one bit or byte at a time.

34
Q

The only streaming cipher

A

RC4

35
Q

Key Strength / Key Space

A

Keyspace is defined by the number of bits the key uses

he larger the keyspace;
– the more possible key values
– the more random the entire process becomes
– increases the strength of the cryptosystem

36
Q

Session Keys

A

A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session between two entities.

IT IS SINGLE USE - discarded at end of session.

37
Q

Ephemeral

A

Temporary (ephemeral key is same as session key)

38
Q

Data-in-Transit

A

Data while it is being transferred from one system to another, or in RAM getting ready to be used.

39
Q

Data-at-Rest

A

Data stored, on a server/HDD/CD etc

40
Q

Data-in-Use

A

Data actively being used, such as in a program you have open.

41
Q

Pseudo-random Number Generation

A

A program written for, and used in, probability and statistics applications when large quantities of random digits are needed.

42
Q

Key Stretching

A

Refers to processes used to take a key that might be a bit weak and make it stronger, usually by making it longer.

43
Q

Perfect Forward Secrecy

A

Forward secrecy is a property of any key exchange system, which ensures that if one key is compromised, subsequent keys will not also be compromised

44
Q
Which type of algorithm uses a public key and a private key that is then used to encrypt and decrypt data and messages sent and received?
A. Elliptic curve
B. Symmetric encryption algorithms
C. Asymmetric encryption algorithms \
D. Paired algorithms
A

C. Asymmetric encryption algorithms

45
Q
Mary claims that she didn’t make a phone call from her office to a competitor and tell them about developments at her company. Telephone logs, however, show that such a call was placed from her phone, and time clock records show that she was the only person working at the time. What do these records provide?
A. Integrity
B. Confidentiality
C. Authentication
D. Nonrepudiation
A

D. Nonrepudiation

46
Q
In Cryptography a \_\_\_\_\_\_\_ is a random number which is used only once and added to a key to make an encryption algorithm stronger.
A. Initialization Vector
B. Nonce
C. PRNG
D. Ephemeral Key
A

A. Initialization Vector