Ch2_2 Flashcards
(30 cards)
What is a hash function?
A one-way cryptographic algorithm that maps input data to a fixed-length output (hash value or digest).
Does a hash function use a key?
No, hash functions do not use encryption keys.
What are uses of hash functions?
Password protection, message authentication, and ensuring data integrity.
Can hash values be reversed to get original data?
No, hash functions are one-way and irreversible.
Give examples of popular hash functions.
SHA-1, SHA-2, SHA-3, MD5
What happens if a small change is made to input data in a hash function?
The output hash changes drastically, indicating loss of integrity.
What is a Message Authentication Code (MAC)?
A digest generated from a message and compared at the receiver’s end to ensure it wasn’t altered.
What is symmetric encryption?
Encryption where the same key is used for both encryption and decryption.
What is the main challenge with symmetric encryption?
Securely exchanging the key between sender and receiver.
Name examples of symmetric algorithms.
- Data Encryption Systems (DES)
- 3DES
- RC4
- Advanced Encryption
Systems (AES).
What are the two types of symmetric ciphers?
Block cipher and Stream cipher
What is a block cipher?
Encrypts data in fixed-size blocks (e.g., 64 or 128 bits) using padding if needed.
What is a stream cipher?
Encrypts data bit-by-bit or byte-by-byte using a keystream.
What is a keystream in stream ciphers?
A pseudo-random sequence of bits XORed with the plaintext to produce ciphertext.
Examples of stream ciphers?
RC4, Salsa20, ChaCha20, A5
What is asymmetric encryption?
Encryption using two different keys: a public key to encrypt and a private key to decrypt.
What are examples of asymmetric encryption uses?
Key exchange, digital signatures, and secure communication.
What is hybrid encryption?
Combining symmetric and asymmetric encryption for speed and secure key exchange.
What is the main drawback of symmetric encryption for many users?
It requires N(N-1)/2 unique keys for N users.
What is a cipher mode of operation?
It defines how to apply a block cipher to securely encrypt large amounts of data.
What does ECB stand for?
Electronic Code Book
How does ECB mode work?
Each block of plaintext is encrypted separately.
What is a major drawback of ECB mode?
Identical plaintext blocks result in identical ciphertext blocks.
What does CBC stand for?
Cipher Block Chaining