Ch2_2 Flashcards

(30 cards)

1
Q

What is a hash function?

A

A one-way cryptographic algorithm that maps input data to a fixed-length output (hash value or digest).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Does a hash function use a key?

A

No, hash functions do not use encryption keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are uses of hash functions?

A

Password protection, message authentication, and ensuring data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Can hash values be reversed to get original data?

A

No, hash functions are one-way and irreversible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give examples of popular hash functions.

A

SHA-1, SHA-2, SHA-3, MD5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What happens if a small change is made to input data in a hash function?

A

The output hash changes drastically, indicating loss of integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Message Authentication Code (MAC)?

A

A digest generated from a message and compared at the receiver’s end to ensure it wasn’t altered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is symmetric encryption?

A

Encryption where the same key is used for both encryption and decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the main challenge with symmetric encryption?

A

Securely exchanging the key between sender and receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name examples of symmetric algorithms.

A
  • Data Encryption Systems (DES)
  • 3DES
  • RC4
  • Advanced Encryption
    Systems (AES).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the two types of symmetric ciphers?

A

Block cipher and Stream cipher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a block cipher?

A

Encrypts data in fixed-size blocks (e.g., 64 or 128 bits) using padding if needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a stream cipher?

A

Encrypts data bit-by-bit or byte-by-byte using a keystream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a keystream in stream ciphers?

A

A pseudo-random sequence of bits XORed with the plaintext to produce ciphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of stream ciphers?

A

RC4, Salsa20, ChaCha20, A5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is asymmetric encryption?

A

Encryption using two different keys: a public key to encrypt and a private key to decrypt.

17
Q

What are examples of asymmetric encryption uses?

A

Key exchange, digital signatures, and secure communication.

18
Q

What is hybrid encryption?

A

Combining symmetric and asymmetric encryption for speed and secure key exchange.

19
Q

What is the main drawback of symmetric encryption for many users?

A

It requires N(N-1)/2 unique keys for N users.

20
Q

What is a cipher mode of operation?

A

It defines how to apply a block cipher to securely encrypt large amounts of data.

21
Q

What does ECB stand for?

A

Electronic Code Book

22
Q

How does ECB mode work?

A

Each block of plaintext is encrypted separately.

23
Q

What is a major drawback of ECB mode?

A

Identical plaintext blocks result in identical ciphertext blocks.

24
Q

What does CBC stand for?

A

Cipher Block Chaining

25
How does CBC mode work?
Each plaintext block is XORed with the previous ciphertext block before encryption.
26
What is the advantage of CBC over ECB?
Even identical plaintext blocks result in different ciphertext due to chaining.
27
What is OFB mode?
Output Feedback Mode, a stream cipher mode that XORs a keystream with plaintext.
28
What is an advantage of OFB mode?
Ciphertext blocks are independent, improving error resistance.
29
What is CFB mode?
Cipher Feedback Mode, a stream cipher mode where encryption of previous ciphertext block is XORed with plaintext.
30
What do OFB and CFB have in common?
Both convert block ciphers into stream ciphers and use XOR with a keystream.