Chapter 10 Flashcards

1
Q

2 types of cryptography:

A
  • Symmetric cryptography
  • Asymmetric cryptography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Compare Transposition encryption and Substitution encryption:

A

Transposition encryption: The position of the character is changed but character’s identity is not changed

Substitution encryption: The character’s identity is changed while its position remains unchanged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compare Monoalphabetic substitution and Polyalphabetic substitution:

A
  • Monoalphabetic substitution: only incorporates a single alphabet in the encryption process. Ex: Caesar cipher.
  • Polyalphabetic substitution: incorporates two or more alphabets in the encryption process. Ex: Vigenère cipher.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compare Stream Cipher and Block Cipher:

A
  • Stream Cipher: plaintext is encrypted one character or bit at a time.
    Ex: Vigenère cipher, and RC4 stream cipher.
  • Block Cipher: plaintext is divided into fixed-size blocks; each block is encrypted using the secret key.
    Ex: DES, and AES.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s RSA algorithm and its phases?

A

a public key encryption technique and is considered the most secure way of encryption.

1- RSA Key Generation
2- RSA Encryption
3- RSA Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s hash function?

A

mathematical function which is used for mapping data into fixed-sized values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 popular hashing algorithms:

A
  • Message Digest Algorithm (MD): MD5, 128 bits
  • Secure Hash Algorithm (SHA)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What’s collision and collision resistance?

A

Collision: when two different inputs result in the same hash output.

Collision Resistance: when it’s computationally infeasible to find two inputs that produce the same hash value. It’s the strongest requirement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly